Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication

被引:10
|
作者
Lee, Kyungroul [1 ]
Yim, Kangbin [2 ]
机构
[1] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan 31538, South Korea
[2] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 04期
基金
新加坡国家研究基金会;
关键词
vulnerability analysis; password authentication; machine learning; user authentication;
D O I
10.3390/app10041286
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the keyboard, hence, the keyboard data does not ensure security. To detect and prevent such an attack, a keyboard data protection technique using random keyboard data generation has been presented. This technique protects keyboard data by generating dummy keyboard data while the attacker obtains the keyboard data. In this study, we demonstrate the feasibility of keyboard data exposure under the keyboard data protection technique. To prove the proposed attack technique, we gathered all the dummy keyboard data generated by the defense tool, and the real keyboard data input by the user, and evaluated the cybersecurity threat of keyboard data based on the machine learning-based offensive technique. We verified that an adversary obtains the keyboard data with 96.2% accuracy even if the attack technique that makes it impossible to attack keyboard data exposure is used. Namely, the proposed method in this study obviously differentiates the keyboard data input by the user from dummy keyboard data. Therefore, the contributions of this paper are that we derived and verified a new security threat and a new vulnerability of password authentication. Furthermore, a new cybersecurity threat derived from this study will have advantages over the security assessment of password authentication and all types of authentication technology and application services input from the keyboard.
引用
下载
收藏
页数:16
相关论文
共 50 条
  • [21] Machine Learning-Based Multifunctional Optical Spectrum Analysis Technique
    Wang, Danshi
    Zhang, Min
    Zhang, Zhiguo
    Li, Jin
    Gao, Hui
    Zhang, Fan
    Chen, Xue
    IEEE ACCESS, 2019, 7 : 19726 - 19737
  • [22] A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks
    Mohmand, Muhammad Ismail
    Hussain, Hameed
    Khan, Ayaz Ali
    Ullah, Ubaid
    Zakarya, Muhammad
    Ahmed, Aftab
    Raza, Mushtaq
    Rahman, Izaz Ur
    Haleem, Muhammad
    IEEE ACCESS, 2022, 10 : 21443 - 21454
  • [23] Machine Learning-Based Detection Technique for NDT in Industrial Manufacturing
    Niccolai, Alessandro
    Caputo, Davide
    Chieco, Leonardo
    Grimaccia, Francesco
    Mussetta, Marco
    MATHEMATICS, 2021, 9 (11)
  • [24] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Ma, Zhuo
    Liu, Yang
    Wang, Zhuzhu
    Ge, Haoran
    Zhao, Meng
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (22): : 16819 - 16831
  • [25] Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
    Ardizzon, Francesco
    Diamant, Roee
    Casari, Paolo
    Tomasin, Stefano
    2022 SIXTH UNDERWATER COMMUNICATIONS AND NETWORKING CONFERENCE (UCOMMS), 2022,
  • [26] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Zhuo Ma
    Yang Liu
    Zhuzhu Wang
    Haoran Ge
    Meng Zhao
    Neural Computing and Applications, 2020, 32 : 16819 - 16831
  • [27] Online machine learning-based physical layer authentication for MmWave MIMO systems
    Liu, Yangyang
    Zhang, Pinchang
    Shen, Yulong
    Peng, Limei
    Jiang, Xiaohong
    AD HOC NETWORKS, 2022, 131
  • [28] Machine learning-based CFD simulations: a review, models, open threats, and future tactics
    Dhruvil Panchigar
    Kunal Kar
    Shashank Shukla
    Rhea Mary Mathew
    Utkarsh Chadha
    Senthil Kumaran Selvaraj
    Neural Computing and Applications, 2022, 34 : 21677 - 21700
  • [29] Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services
    Omara, Ahmed
    Kantarci, Burak
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1844 - 1849
  • [30] Machine learning-based CFD simulations: a review, models, open threats, and future tactics
    Panchigar, Dhruvil
    Kar, Kunal
    Shukla, Shashank
    Mathew, Rhea Mary
    Chadha, Utkarsh
    Selvaraj, Senthil Kumaran
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (24): : 21677 - 21700