Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication

被引:10
|
作者
Lee, Kyungroul [1 ]
Yim, Kangbin [2 ]
机构
[1] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan 31538, South Korea
[2] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 04期
基金
新加坡国家研究基金会;
关键词
vulnerability analysis; password authentication; machine learning; user authentication;
D O I
10.3390/app10041286
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the keyboard, hence, the keyboard data does not ensure security. To detect and prevent such an attack, a keyboard data protection technique using random keyboard data generation has been presented. This technique protects keyboard data by generating dummy keyboard data while the attacker obtains the keyboard data. In this study, we demonstrate the feasibility of keyboard data exposure under the keyboard data protection technique. To prove the proposed attack technique, we gathered all the dummy keyboard data generated by the defense tool, and the real keyboard data input by the user, and evaluated the cybersecurity threat of keyboard data based on the machine learning-based offensive technique. We verified that an adversary obtains the keyboard data with 96.2% accuracy even if the attack technique that makes it impossible to attack keyboard data exposure is used. Namely, the proposed method in this study obviously differentiates the keyboard data input by the user from dummy keyboard data. Therefore, the contributions of this paper are that we derived and verified a new security threat and a new vulnerability of password authentication. Furthermore, a new cybersecurity threat derived from this study will have advantages over the security assessment of password authentication and all types of authentication technology and application services input from the keyboard.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] A Deep Learning-Based Password Security Evaluation Model
    Hong, Ki Hyeon
    Lee, Byung Mun
    APPLIED SCIENCES-BASEL, 2022, 12 (05):
  • [22] Machine Learning-Based Multifunctional Optical Spectrum Analysis Technique
    Wang, Danshi
    Zhang, Min
    Zhang, Zhiguo
    Li, Jin
    Gao, Hui
    Zhang, Fan
    Chen, Xue
    IEEE ACCESS, 2019, 7 : 19726 - 19737
  • [23] A machine learning-based technique to help students learn programming
    Chae, Jeongmin
    Cha, Da-Eun
    Yoo, Sujin
    Kim, Insuh
    Park, Jeonghoon
    Park, Seongbin
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 50 - 51
  • [24] Machine Learning-Based Forecasting Technique for Crop Yield: A Study
    Ragunath, R.
    Narmadha, N.
    Rathipriya, R.
    SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 277 - 289
  • [25] A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks
    Mohmand, Muhammad Ismail
    Hussain, Hameed
    Khan, Ayaz Ali
    Ullah, Ubaid
    Zakarya, Muhammad
    Ahmed, Aftab
    Raza, Mushtaq
    Rahman, Izaz Ur
    Haleem, Muhammad
    IEEE ACCESS, 2022, 10 : 21443 - 21454
  • [26] Machine Learning-Based Detection Technique for NDT in Industrial Manufacturing
    Niccolai, Alessandro
    Caputo, Davide
    Chieco, Leonardo
    Grimaccia, Francesco
    Mussetta, Marco
    MATHEMATICS, 2021, 9 (11)
  • [27] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Ma, Zhuo
    Liu, Yang
    Wang, Zhuzhu
    Ge, Haoran
    Zhao, Meng
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (22): : 16819 - 16831
  • [28] Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
    Ardizzon, Francesco
    Diamant, Roee
    Casari, Paolo
    Tomasin, Stefano
    2022 SIXTH UNDERWATER COMMUNICATIONS AND NETWORKING CONFERENCE (UCOMMS), 2022,
  • [29] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Zhuo Ma
    Yang Liu
    Zhuzhu Wang
    Haoran Ge
    Meng Zhao
    Neural Computing and Applications, 2020, 32 : 16819 - 16831
  • [30] A survey of Machine Learning-based Physical-Layer Authentication in wireless communications
    Meng, Rui
    Xu, Bingxuan
    Xu, Xiaodong
    Sun, Mengying
    Wang, Bizhu
    Han, Shujun
    Lv, Suyu
    Zhang, Ping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 235