Neural network techniques for proactive password checking

被引:27
作者
Ciaramella, Angelo
D'Arco, Paolo
De Santis, Alfredo
Galdi, Clemente
Tagliaferri, Roberto
机构
[1] Univ Salerno, Dipartimento Matemat & Informat, I-84084 Fisciano, SA, Italy
[2] Univ Salerno, Dipartimento Informat & Applicaz, I-84084 Fisciano, SA, Italy
[3] Univ Naples Federico II, Dipartimento Sci Fis, I-80126 Naples, Italy
关键词
system security; access control; passwords; machine learning; neural networks;
D O I
10.1109/TDSC.2006.53
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper deals with the access control problem. We assume that valuable resources need to be protected against unauthorized users and that, to this aim, a password-based access control scheme is employed. Such an abstract scenario captures many applicative settings. The issue we focus our attention on is the following: Password-based schemes provide a certain level of security as long as users choose good passwords, i.e., passwords that are hard to guess in a reasonable amount of time. In order to force the users to make good choices, a proactive password checker can be implemented as a submodule of the access control scheme. Such a checker, any time the user chooses/changes his own password, decides on the fly whether to accept or refuse the new password, depending on its guessability. Hence, the question is: How can we get an effective and efficient proactive password checker? By means of neural networks and statistical techniques, we answer the above question, developing suitable proactive password checkers. Through a series of experiments, we show that these checkers have very good performance: Error rates are comparable to those of the best existing checkers, implemented on different principles and by using other methodologies, and the memory requirements are better in several cases. It is the first time that neural network technology has been fully and successfully applied to designing proactive password checkers.
引用
收藏
页码:327 / 339
页数:13
相关论文
共 25 条
[1]  
[Anonymous], 1989, Conference on the Theory and Application of Cryptology, DOI 10.1007/0-387-34805-0_22
[2]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[3]  
Bergadano F, 1998, ACM T INFORMATION SY, V1, P3, DOI DOI 10.1145/290163.290164
[4]  
Bishop C. M., 1996, Neural networks for pattern recognition
[5]  
Bishop M., 1992, P 4 WORKSH COMP SEC, P1
[6]   HYPPOCRATES: a new proactive password checker [J].
Blundo, C ;
D'Arco, P ;
De Santis, A ;
Galdi, C .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) :163-175
[7]  
BLUNDO C, 2002, P INFR SEC INFRASEC, P30
[8]  
Boyarsky MK, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P63, DOI 10.1145/319709.319719
[9]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[10]   Fuzzy relational neural network [J].
Ciaramella, A ;
Tagliaferri, R ;
Pedrycz, W ;
Di Nola, A .
INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2006, 41 (02) :146-163