Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Recurrent GANs Password Cracker For IoT Password Security Enhancement

Authors
Nam, SungyupJeon, SeunghoKim, HongkyoMoon, Jongsub
Issue Date
6월-2020
Publisher
MDPI
Keywords
password cracking; GAN; IWGAN; RNN; PCFG; passGAN; hashcat; IoT
Citation
SENSORS, v.20, no.11
Indexed
SCIE
SCOPUS
Journal Title
SENSORS
Volume
20
Number
11
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/55098
DOI
10.3390/s20113106
ISSN
1424-8220
Abstract
Text-based passwords are a fundamental and popular means of authentication. Password authentication can be simply implemented because it does not require any equipment, unlike biometric authentication, and it relies only on the users' memory. This reliance on memory is a weakness of passwords, and people therefore usually use easy-to-remember passwords, such as "iloveyou1234". However, these sample passwords are not difficult to crack. The default passwords of IoT also are text-based passwords and are easy to crack. This weakness enables free password cracking tools such as Hashcat and JtR to execute millions of cracking attempts per second. Finally, this weakness creates a security hole in networks by giving hackers access to an IoT device easily. Research has been conducted to better exploit weak passwords to improve password-cracking performance. The Markov model and probabilistic context-free-grammar (PCFG) are representative research results, and PassGAN, which uses generative adversarial networks (GANs), was recently introduced. These advanced password cracking techniques contribute to the development of better password strength checkers. We studied some methods of improving the performance of PassGAN, and developed two approaches for better password cracking: the first was changing the convolutional neural network (CNN)-based improved Wasserstein GAN (IWGAN) cost function to an RNN-based cost function; the second was employing the dual-discriminator GAN structure. In the password cracking performance experiments, our models showed 10-15% better performance than PassGAN. Through additional performance experiments with PCFG, we identified the cracking performance advantages of PassGAN and our models over PCFG. Finally, we prove that our models enhanced password strength estimation through a comparison with zxcvbn.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Electronics and Information Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE