Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability

Author:

Lee Jaehyuk1,Jeong Wonbin2,Lee Kyungroul2

Affiliation:

1. Process Development Team, Fescaro, Suwon 16512, Republic of Korea

2. Department of Information Security Engineering, Mokpo National University, Muan 58554, Republic of Korea

Abstract

In computer systems, user authentication technology is required to identify users who use computers. In modern times, various user authentication technologies, including strong security features based on ownership, such as certificates and security cards, have been introduced. Nevertheless, password-based authentication technology is currently mainly used due to its convenience of use and ease of implementation. However, according to Verizon’s “2022 Data Breach Investigations Report”, among all security incidents, security incidents caused by password exposures accounted for 82%. Hence, the security of password authentication technology is important. Consequently, this article analyzes prior research on keyboard data attacks and defense techniques to draw the fundamental reasons for keyboard data attacks and derive countermeasures. The first prior research is about stealing keyboard data, an attack that uses machine learning to steal keyboard data to overcome the limitations of a C/D bit attack. The second prior research is an attack technique that steals keyboard data more efficiently by expanding the features of machine learning used in the first prior research. In this article, based on previous research findings, we proposed a keyboard data protection technique using GAN, a Generative Adversarial Network, and verified its feasibility. To summarize the results of performance evaluation with previous research, the machine learning-based keyboard data attack based on the prior research exhibited a 96.7% attack success rate, while the study’s proposed method significantly decreased the attack success rate by approximately 13%. Notably, in all experiments, the average decrease in the keyboard data classification performance ranged from a minimum of −29% to a maximum of 52%. When evaluating performance based on maximum performance, all performance indicators were found to decrease by more than 50%.

Funder

National Research Foundation of Korea

Publisher

MDPI AG

Reference30 articles.

1. Conklin, A., Dietrich, G., and Walz, D. (2004, January 5–8). Password-based authentication: A system perspective. Proceedings of the IEEE 37th Annual Hawaii International Conference on System Sciences, Big Island, HI, USA.

2. Recent Trends in User Authentication—A Survey;Shah;IEEE Access,2019

3. Ur, B., Kelley, P.G., Komanduri, S., Lee, J., Maass, M., Mazurek, M.L., Passaro, T., Shay, R., Vidas, T., and Bauer, L. (2012, January 8–10). How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. Proceedings of the 21st USENIX Security Symposium (USENIX Security 12), Bellevue, WA, USA.

4. Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends;Ferrag;Secur. Commun. Netw.,2019

5. Passwords and the Evolution of Imperfect Authentication;Bonneau;Commun. ACM,2015

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3