![]() |
International Journal of Scientific Research and Engineering Development( International Peer Reviewed Open Access Journal ) ISSN [ Online ] : 2581 - 7175 |
IJSRED » Archives » Volume 9 -Issue 2

📑 Paper Information
| 📑 Paper Title | Cloud Based OTP Brute Force Blocker |
| 👤 Authors | Yamuna Rupini J, Andal S |
| 📘 Published Issue | Volume 9 Issue 2 |
| 📅 Year of Publication | 2026 |
| 🆔 Unique Identification Number | IJSRED-V9I2P393 |
| 📑 Search on Google | Click Here |
📝 Abstract
The cloud-based reliable authentication platform with innovation in security analytics offers various defensive features like user behavior based OTP verification, intelligent bot detection and behavior based adaptive counter measures against advanced cyber-attacks in a convenient web authentication environment. To achieve this, we leverage next-generation behavioral analysis techniques to accurately track user interactions, capturing metrics such as typing speed, response time delays, frequency of corrections, and input characteristics during the OTP validation procedure. The intelligent authentication system doesn't just check for code accuracy at its core like standard authentication solutions but it adds an additional layer of human-centric cognition by presenting seemingly complex OTP challenges coupled with real-time instructions for entering characters (such as entering only digits, selecting elements based on position in a string, etc.) requiring critical interpretation before submission. The byproduct of this method is a supremely secure alphanumeric token transformed into visual instruction puzzles necessitating human logic to interpret (e.g., number extraction, position-based selection) thus significantly obstructing malicious automation tools or brute-force spam bots from breaching. Moreover, the platform implements a clandestine security feature utilizing web application stealth honeypot fields set in autogeneration mode within the login form. These invisible fields lure bots into common automation traps filling all fields so the platform can rapidly 'snitch out' attacker IP addresses and take proactive steps to blocking them motion etching their identity solely using field extension detection. Additionally, the server actively monitors user interaction patterns and assigns confidence scales for human, attacker, and attacker automated classifications to authenticate multiple user verification attempts while preempting, deceiving, or falsifying automation. Authentic persistent users are granted several authentication recompilations with permissible time delay restrictions; in contrast, hostile behavior quickly emanates into immediate enemy status enrichment by instant moment effect deviation and session rejection. At every instant, all perils are indexed and summarized in a secure elastic cloud tracking environment giving admins what intelligence is needed to inherently stay ahead of evolving criminal tactical innovations.
📝 How to Cite
Shifa Bilal Tamboli, Simeen Phiroj Mulani, Arman Tajuddin Shiakh,"Cloud Based OTP Brute Force Blocker" International Journal of Scientific Research and Engineering Development, V9(2): Page(2120-2125) Mar-Apr 2026. ISSN: 2581-7175. www.ijsred.com. Published by Scientific and Academic Research Publishing.
📘 Other Details
