Machine-Learning-Based Password-Strength-Estimation Approach for Passwords of Lithuanian Context

被引:3
作者
Darbutaite, Ema [1 ]
Stefanovic, Pavel [1 ]
Ramanauskaite, Simona [1 ]
机构
[1] Vilnius Gediminas Tech Univ, Fac Fundamental Sci, Sauletekio Al 11, LT-10223 Vilnius, Lithuania
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 13期
关键词
password-strength estimation; machine learning; Lithuanian password; password meters; zxcvbn; SECURITY;
D O I
10.3390/app13137811
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In an information-security-assurance system, humans are usually the weakest link. It is partly related to insufficient cybersecurity knowledge and the ignorance of standard security recommendations. Consequently, the required password-strength requirements in information systems are the minimum of what can be done to ensure system security. Therefore, it is important to use up-to-date and context-sensitive password-strength-estimation systems. However, minor languages are ignored, and password strength is usually estimated using English-only dictionaries. To change the situation, a machine learning approach was proposed in this article to support a more realistic model to estimate the strength of Lithuanian user passwords. A newly compiled dataset of password strength was produced. It integrated both international- and Lithuanian-language-specific passwords, including 6 commonly used password features and 36 similarity metrics for each item (4 similarity metrics for 9 different dictionaries). The proposed solution predicts the password strength of five classes with 77% accuracy. Taking into account the complexity of the accuracy of the Lithuanian language, the achieved result is adequate, as the availability of intelligent Lithuanian-language-specific password-cracking tools is not widely available yet.
引用
收藏
页数:15
相关论文
共 33 条
  • [1] Awad M, 2016, INT C ELECT DEVICE S
  • [2] Bansal B., PASSWORD STRENGTH CL
  • [3] Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Efficiency against Single-Flow CNN Models for the Host-Based Intrusion and Malware Detection Task on Univariate Times Series Data
    Ceponis, Dainius
    Goranin, Nikolaj
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (07):
  • [4] A Survey of Deep Learning and Its Applications: A New Paradigm to Machine Learning
    Dargan, Shaveta
    Kumar, Munish
    Ayyagari, Maruthi Rohit
    Kumar, Gulshan
    [J]. ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2020, 27 (04) : 1071 - 1092
  • [5] Adaptation of password strength estimators to a non-English environment-the Czech experience
    Doucek, Petr
    Pavlicek, Lubos
    Sedlacek, Jiri
    Nedomova, Lea
    [J]. COMPUTERS & SECURITY, 2020, 95
  • [6] forebears, MOST POP 1 NAM LITH
  • [7] forebears, MOST COMM LAST NAM L
  • [8] github, MANT SASN LEXC LT SE
  • [9] Golla M., 2018, P 2018 ACM SIGSAC C
  • [10] Face Recognition Using Popular Deep Net Architectures: A Brief Comparative Study
    Gwyn, Tony
    Roy, Kaushik
    Atay, Mustafa
    [J]. FUTURE INTERNET, 2021, 13 (07)