Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication

被引:10
|
作者
Lee, Kyungroul [1 ]
Yim, Kangbin [2 ]
机构
[1] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan 31538, South Korea
[2] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 04期
基金
新加坡国家研究基金会;
关键词
vulnerability analysis; password authentication; machine learning; user authentication;
D O I
10.3390/app10041286
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the keyboard, hence, the keyboard data does not ensure security. To detect and prevent such an attack, a keyboard data protection technique using random keyboard data generation has been presented. This technique protects keyboard data by generating dummy keyboard data while the attacker obtains the keyboard data. In this study, we demonstrate the feasibility of keyboard data exposure under the keyboard data protection technique. To prove the proposed attack technique, we gathered all the dummy keyboard data generated by the defense tool, and the real keyboard data input by the user, and evaluated the cybersecurity threat of keyboard data based on the machine learning-based offensive technique. We verified that an adversary obtains the keyboard data with 96.2% accuracy even if the attack technique that makes it impossible to attack keyboard data exposure is used. Namely, the proposed method in this study obviously differentiates the keyboard data input by the user from dummy keyboard data. Therefore, the contributions of this paper are that we derived and verified a new security threat and a new vulnerability of password authentication. Furthermore, a new cybersecurity threat derived from this study will have advantages over the security assessment of password authentication and all types of authentication technology and application services input from the keyboard.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Simultaneous Reconnection Surgery Technique of Routing With Machine Learning-Based Acceleration
    Tu, Peishan
    Pui, Chak-Wa
    Young, Evangeline F. Y.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (06) : 1245 - 1257
  • [42] Machine Learning-Based Pruning Technique for Low Power Approximate Computing
    Sakthivel, B.
    Jayaram, K.
    Devarajan, N. Manikanda
    Basha, S. Mahaboob
    Rajapriya, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (01): : 397 - 406
  • [43] A signature based password authentication method
    Fung, GSK
    Lau, RWH
    Liu, JNK
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 631 - 636
  • [44] Musical Password based Biometric Authentication
    Prakash, Ravi
    Kumar, Suresh
    Kumar, Chandan
    Mishra, K. K.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1016 - 1019
  • [45] A Reinforcement Learning-based Sequence Generation Algorithm for Password Guessing
    Chen, Zheng
    Zhang, Xuliang
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4891 - 4896
  • [46] Cybersecurity Threats in Connected and Automated Vehicles based Federated Learning Systems
    Al Mallah, Ranwa
    Badu-Marfo, Godwin
    Farooq, Bilal
    2021 IEEE INTELLIGENT VEHICLES SYMPOSIUM WORKSHOPS (IV WORKSHOPS), 2021, : 13 - 18
  • [47] Data Analytics for Cybersecurity Based on Machine Learning Algorithms
    Wang, Lidong
    Mosher, Reed L.
    Duett, Patti
    Falls, Terril C.
    SOUTHEASTCON 2023, 2023, : 810 - 814
  • [48] Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication
    Lee, Kyungroul
    Lee, Sun-Young
    ENTROPY, 2020, 22 (03)
  • [49] A machine learning-based approach to detect threats in bio-cyber DNA storage systems
    Tavella, Federico
    Giaretta, Alberto
    Conti, Mauro
    Balasubramaniam, Sasitharan
    COMPUTER COMMUNICATIONS, 2022, 187 : 59 - 70
  • [50] Securing Password in Static Password-based Authentication: A Review
    Mohamedali, Intisar A.
    Fadlalla, Yahia
    PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT), 2017, : 98 - 102