Cargando…

Recurrent GANs Password Cracker For IoT Password Security Enhancement †

Text-based passwords are a fundamental and popular means of authentication. Password authentication can be simply implemented because it does not require any equipment, unlike biometric authentication, and it relies only on the users’ memory. This reliance on memory is a weakness of passwords, and p...

Descripción completa

Detalles Bibliográficos
Autores principales: Nam, Sungyup, Jeon, Seungho, Kim, Hongkyo, Moon, Jongsub
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7309056/
https://www.ncbi.nlm.nih.gov/pubmed/32486361
http://dx.doi.org/10.3390/s20113106
_version_ 1783549135727624192
author Nam, Sungyup
Jeon, Seungho
Kim, Hongkyo
Moon, Jongsub
author_facet Nam, Sungyup
Jeon, Seungho
Kim, Hongkyo
Moon, Jongsub
author_sort Nam, Sungyup
collection PubMed
description Text-based passwords are a fundamental and popular means of authentication. Password authentication can be simply implemented because it does not require any equipment, unlike biometric authentication, and it relies only on the users’ memory. This reliance on memory is a weakness of passwords, and people therefore usually use easy-to-remember passwords, such as “iloveyou1234”. However, these sample passwords are not difficult to crack. The default passwords of IoT also are text-based passwords and are easy to crack. This weakness enables free password cracking tools such as Hashcat and JtR to execute millions of cracking attempts per second. Finally, this weakness creates a security hole in networks by giving hackers access to an IoT device easily. Research has been conducted to better exploit weak passwords to improve password-cracking performance. The Markov model and probabilistic context-free-grammar (PCFG) are representative research results, and PassGAN, which uses generative adversarial networks (GANs), was recently introduced. These advanced password cracking techniques contribute to the development of better password strength checkers. We studied some methods of improving the performance of PassGAN, and developed two approaches for better password cracking: the first was changing the convolutional neural network (CNN)-based improved Wasserstein GAN (IWGAN) cost function to an RNN-based cost function; the second was employing the dual-discriminator GAN structure. In the password cracking performance experiments, our models showed 10–15% better performance than PassGAN. Through additional performance experiments with PCFG, we identified the cracking performance advantages of PassGAN and our models over PCFG. Finally, we prove that our models enhanced password strength estimation through a comparison with zxcvbn.
format Online
Article
Text
id pubmed-7309056
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-73090562020-06-25 Recurrent GANs Password Cracker For IoT Password Security Enhancement † Nam, Sungyup Jeon, Seungho Kim, Hongkyo Moon, Jongsub Sensors (Basel) Article Text-based passwords are a fundamental and popular means of authentication. Password authentication can be simply implemented because it does not require any equipment, unlike biometric authentication, and it relies only on the users’ memory. This reliance on memory is a weakness of passwords, and people therefore usually use easy-to-remember passwords, such as “iloveyou1234”. However, these sample passwords are not difficult to crack. The default passwords of IoT also are text-based passwords and are easy to crack. This weakness enables free password cracking tools such as Hashcat and JtR to execute millions of cracking attempts per second. Finally, this weakness creates a security hole in networks by giving hackers access to an IoT device easily. Research has been conducted to better exploit weak passwords to improve password-cracking performance. The Markov model and probabilistic context-free-grammar (PCFG) are representative research results, and PassGAN, which uses generative adversarial networks (GANs), was recently introduced. These advanced password cracking techniques contribute to the development of better password strength checkers. We studied some methods of improving the performance of PassGAN, and developed two approaches for better password cracking: the first was changing the convolutional neural network (CNN)-based improved Wasserstein GAN (IWGAN) cost function to an RNN-based cost function; the second was employing the dual-discriminator GAN structure. In the password cracking performance experiments, our models showed 10–15% better performance than PassGAN. Through additional performance experiments with PCFG, we identified the cracking performance advantages of PassGAN and our models over PCFG. Finally, we prove that our models enhanced password strength estimation through a comparison with zxcvbn. MDPI 2020-05-31 /pmc/articles/PMC7309056/ /pubmed/32486361 http://dx.doi.org/10.3390/s20113106 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Nam, Sungyup
Jeon, Seungho
Kim, Hongkyo
Moon, Jongsub
Recurrent GANs Password Cracker For IoT Password Security Enhancement †
title Recurrent GANs Password Cracker For IoT Password Security Enhancement †
title_full Recurrent GANs Password Cracker For IoT Password Security Enhancement †
title_fullStr Recurrent GANs Password Cracker For IoT Password Security Enhancement †
title_full_unstemmed Recurrent GANs Password Cracker For IoT Password Security Enhancement †
title_short Recurrent GANs Password Cracker For IoT Password Security Enhancement †
title_sort recurrent gans password cracker for iot password security enhancement †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7309056/
https://www.ncbi.nlm.nih.gov/pubmed/32486361
http://dx.doi.org/10.3390/s20113106
work_keys_str_mv AT namsungyup recurrentganspasswordcrackerforiotpasswordsecurityenhancement
AT jeonseungho recurrentganspasswordcrackerforiotpasswordsecurityenhancement
AT kimhongkyo recurrentganspasswordcrackerforiotpasswordsecurityenhancement
AT moonjongsub recurrentganspasswordcrackerforiotpasswordsecurityenhancement