**6. Conclusions**

If a user has forgotten his or her password, he or she may recover it by using the

It is possible to crack a user's password by using a special dictionary. To protect you from this attack, the password is hashed together with a random number (salt). This salt can be calculated using the PHP function uniqid. This function uses the system timer and pseudorandom number generator for maximum uniqueness and

Impurity is added to the password when it uses concatenation operation (.) and

When registering the user list of URLs stored in an array, the Next array analysis and Bayesian classification occur in subject areas that you are interested. After their

1.Access the table "interest" to obtain a unique number (the "interests\_id") of

stored in an additional field "uniqid" database table of registered users.

2.Next all the unique rooms of interest are assigned to a user in table

3. In the field "user\_id," a unique number of the user; and in the field

4.Thus, in table "users\_interests," rows as many as the user's interests will be

When you try to log in, user input verification occurs with those that are stored

When authorizing, a user browser extension should get a list of thousands of URLs, which he attended in the last 30 days. If their number is less than 1000, the extension will keep all the available URLs for these 30 days. Next to each URL is

After categorization, the entire list of URLs of interest of the user is compared with its interests in the DB. If the difference exceeds the threshold of discrepancy,

If the user is authenticated from someone else's computer, to authenticate it gets a list of interests. In this list, user must select the interests of the subject areas that have been identified during registration. Then the user specifies additional ques-

If the remote user session duration exceeds the maximum possible period, to continue the work he would have to pass reauthorization. After a specified period of time to a user, that is, on any Web pages, page opens instead of "authorization." Such a modification is introduced in order to enhance the security of user in the system, because while you are out of the workplace, an attacker could gain access to

in the database (the password is hashed first, and then compared with the one stored in the database password). Username and password must match exactly with

definitions, user interests are recorded in the database as follows:

"interest\_id," a unique room of interest are recorded.

determined by its area of expertise (there may be several).

tions—one for each subject area (as described above).

confidential data, posing as the owner of the account records.

stored exactly, as it was determined.

those that are stored in the database.

the authorization will be refused.

**78**

To exclude threats of kidnapping registered users passwords directly from a database on a Web server, passwords should be stored in a database in a hashed form. To do this in PHP, there are special functions, e.g., md5 (MD5 hashing algorithm that produces a hash value with a length of 128 bits) [9]. This function

function "forgot password?"

unpredictability of salt.

each user's interests.

"users\_interests."

returns the result string with hexadecimal hash value.

*Wireless Mesh Networks - Security, Architectures and Protocols*

The principles of authentication of users based on their knowledge of their work on the Internet are identified, as well as analyzed by means of collecting such knowledge. The methods to gather and compile information about users of the Internet are analyzed, including browser history log and the DOM of an html page. The methods for solving classification tasks in relation to the interests of Internet users are also analyzed. Their advantages and disadvantages are revealed. In order to accomplish the above objective, Bayesian method was selected.

Also, authentication algorithms are developed and implemented for:


Extensions for browsers such as Google Chrome and Mozilla Firefox, allowing receiving log information browser visits within a specified time period are developed as well.

Thus, the work examines the shortcomings of existing methods of authentication when accessing remote information system. The method of multi-factor user authentication does not require the user to commit additional action during authorization. This method increases the reliability of the user's authorization results compared to the password authentication.

Compared to the use of the device-based authentication method, this method does not require extra costs and does not complicate the administration of information systems due to the need for programming and accounting for issuance of authentication devices.

The application of the method described does not require creating a cryptographically secured connection between a remote user and server information system. Setting a connection involves the creation of a public key infrastructure that also complicates the administration of information system.

Application of the developed method of authentication increases the security of your information systems without the need to increase the cost of its administration. This is especially important for organizations with limited budgets, which include distance education universities.
