Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication

被引:10
|
作者
Lee, Kyungroul [1 ]
Yim, Kangbin [2 ]
机构
[1] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan 31538, South Korea
[2] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 04期
基金
新加坡国家研究基金会;
关键词
vulnerability analysis; password authentication; machine learning; user authentication;
D O I
10.3390/app10041286
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the keyboard, hence, the keyboard data does not ensure security. To detect and prevent such an attack, a keyboard data protection technique using random keyboard data generation has been presented. This technique protects keyboard data by generating dummy keyboard data while the attacker obtains the keyboard data. In this study, we demonstrate the feasibility of keyboard data exposure under the keyboard data protection technique. To prove the proposed attack technique, we gathered all the dummy keyboard data generated by the defense tool, and the real keyboard data input by the user, and evaluated the cybersecurity threat of keyboard data based on the machine learning-based offensive technique. We verified that an adversary obtains the keyboard data with 96.2% accuracy even if the attack technique that makes it impossible to attack keyboard data exposure is used. Namely, the proposed method in this study obviously differentiates the keyboard data input by the user from dummy keyboard data. Therefore, the contributions of this paper are that we derived and verified a new security threat and a new vulnerability of password authentication. Furthermore, a new cybersecurity threat derived from this study will have advantages over the security assessment of password authentication and all types of authentication technology and application services input from the keyboard.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Machine learning-based jamming attack classification and effective defense technique
    Lee, Sun-Jin
    Lee, Yu-Rim
    Jeon, So-Eun
    Lee, Il-Gu
    COMPUTERS & SECURITY, 2023, 128
  • [42] cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing
    Maryam, Afifa
    Ahmed, Usman
    Aleem, Muhammad
    Lin, Jerry Chun-Wei
    Arshad Islam, Muhammad
    Iqbal, Muhammad Azhar
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [43] Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection
    Zakariah, Mohammed
    AlQahtani, Salman A. A.
    Al-Rakhami, Mabrook S. S.
    APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [44] Machine Learning-based Power Control Technique for Wireless Power Transfer
    Na, Kyungmin
    Kim, Jieun
    Park, Young-Jin
    2020 IEEE WIRELESS POWER TRANSFER CONFERENCE (WPTC), 2020, : 443 - 446
  • [45] A Machine Learning-Based Detection Technique for Optical Fiber Nonlinearity Mitigation
    Amari, Abdelkerim
    Lin, Xiang
    Dobre, Octavia A.
    Venkatesan, Ramachandran
    Alvarado, Alex
    IEEE PHOTONICS TECHNOLOGY LETTERS, 2019, 31 (08) : 627 - 630
  • [46] Machine learning-based anti-jamming technique at the physical layer
    Chehimi, Mahdi
    Awad, Mohamad Khattar
    Al-Husseini, Mohammed
    Chehab, Ali
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (09):
  • [47] Simultaneous Reconnection Surgery Technique of Routing With Machine Learning-Based Acceleration
    Tu, Peishan
    Pui, Chak-Wa
    Young, Evangeline F. Y.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (06) : 1245 - 1257
  • [48] Machine Learning-Based Pruning Technique for Low Power Approximate Computing
    Sakthivel, B.
    Jayaram, K.
    Devarajan, N. Manikanda
    Basha, S. Mahaboob
    Rajapriya, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (01): : 397 - 406
  • [49] A Reinforcement Learning-based Sequence Generation Algorithm for Password Guessing
    Chen, Zheng
    Zhang, Xuliang
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4891 - 4896
  • [50] Cybersecurity Threats in Connected and Automated Vehicles based Federated Learning Systems
    Al Mallah, Ranwa
    Badu-Marfo, Godwin
    Farooq, Bilal
    2021 IEEE INTELLIGENT VEHICLES SYMPOSIUM WORKSHOPS (IV WORKSHOPS), 2021, : 13 - 18