Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication

被引:10
|
作者
Lee, Kyungroul [1 ]
Yim, Kangbin [2 ]
机构
[1] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan 31538, South Korea
[2] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 04期
基金
新加坡国家研究基金会;
关键词
vulnerability analysis; password authentication; machine learning; user authentication;
D O I
10.3390/app10041286
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the keyboard, hence, the keyboard data does not ensure security. To detect and prevent such an attack, a keyboard data protection technique using random keyboard data generation has been presented. This technique protects keyboard data by generating dummy keyboard data while the attacker obtains the keyboard data. In this study, we demonstrate the feasibility of keyboard data exposure under the keyboard data protection technique. To prove the proposed attack technique, we gathered all the dummy keyboard data generated by the defense tool, and the real keyboard data input by the user, and evaluated the cybersecurity threat of keyboard data based on the machine learning-based offensive technique. We verified that an adversary obtains the keyboard data with 96.2% accuracy even if the attack technique that makes it impossible to attack keyboard data exposure is used. Namely, the proposed method in this study obviously differentiates the keyboard data input by the user from dummy keyboard data. Therefore, the contributions of this paper are that we derived and verified a new security threat and a new vulnerability of password authentication. Furthermore, a new cybersecurity threat derived from this study will have advantages over the security assessment of password authentication and all types of authentication technology and application services input from the keyboard.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems
    Makrani, Hosein Mohammadi
    Sayadi, Hossein
    Nazari, Najmeh
    Homayoun, Houman
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021, 2022, 1536 : 22 - 32
  • [32] Cybersecurity Advances in SCADA Systems Machine Learning-based Insider Threat Detection and Future Directions
    Al-Muntaser, Bakil
    Mohamed, Mohamad Afendee
    Tuama, Ammar Yaseen
    Rana, Imran Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (08) : 318 - 328
  • [33] Machine Learning-based Robust Physical Layer Authentication Using Angle of Arrival Estimation
    Pham, Thuy M.
    Senigagliesi, Linda
    Baldi, Marco
    Fettweis, Gerhard P.
    Chorti, Arsenia
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 13 - 18
  • [34] Machine learning-based jamming attack classification and effective defense technique
    Lee, Sun-Jin
    Lee, Yu-Rim
    Jeon, So-Eun
    Lee, Il-Gu
    COMPUTERS & SECURITY, 2023, 128
  • [35] cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing
    Maryam, Afifa
    Ahmed, Usman
    Aleem, Muhammad
    Lin, Jerry Chun-Wei
    Arshad Islam, Muhammad
    Iqbal, Muhammad Azhar
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
    Zahednejad, Behnam
    Ke, Lishan
    Li, Jing
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [37] Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection
    Zakariah, Mohammed
    AlQahtani, Salman A. A.
    Al-Rakhami, Mabrook S. S.
    APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [38] Machine Learning-based Power Control Technique for Wireless Power Transfer
    Na, Kyungmin
    Kim, Jieun
    Park, Young-Jin
    2020 IEEE WIRELESS POWER TRANSFER CONFERENCE (WPTC), 2020, : 443 - 446
  • [39] A Machine Learning-Based Detection Technique for Optical Fiber Nonlinearity Mitigation
    Amari, Abdelkerim
    Lin, Xiang
    Dobre, Octavia A.
    Venkatesan, Ramachandran
    Alvarado, Alex
    IEEE PHOTONICS TECHNOLOGY LETTERS, 2019, 31 (08) : 627 - 630
  • [40] Machine learning-based anti-jamming technique at the physical layer
    Chehimi, Mahdi
    Awad, Mohamad Khattar
    Al-Husseini, Mohammed
    Chehab, Ali
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (09):