• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Han Weili, Zhang Junjie, Xu Ming, Wang Chuanwang, Zhang Haodong, He Zhenying, Chen Hu. Parameterized Hybrid Password Guessing Method[J]. Journal of Computer Research and Development, 2022, 59(12): 2708-2722. DOI: 10.7544/issn1000-1239.20210456
Citation: Han Weili, Zhang Junjie, Xu Ming, Wang Chuanwang, Zhang Haodong, He Zhenying, Chen Hu. Parameterized Hybrid Password Guessing Method[J]. Journal of Computer Research and Development, 2022, 59(12): 2708-2722. DOI: 10.7544/issn1000-1239.20210456

Parameterized Hybrid Password Guessing Method

Funds: This work was supported by the National Natural Science Foundation of China (U1836207) and Shanghai Science and Technology Fund (21511101600).
More Information
  • Published Date: November 30, 2022
  • The textual password based authentication method is still the mainstream for users to authenticate their identities. To better study password security, researchers propose many data-driven password guessing methods, such as probabilistic context-free grammars (PCFG) and Markov model-based methods. These methods have unique advantages in guessing passwords, i.e., they can guess specific types of passwords with a smaller number of guesses. To make full use of these advantages for better guessing efficiency, we propose a general practical framework of parameterized hybrid guessing. The framework consists of a model pruning method and an allocation strategy for guesses which is theoretically proved optimal. It can mix the guess advantages of different data-driven methods to generate more efficient guessing sets. To verify the generality and efficiency of the framework, we analyze and mix the different advantages of existing data-driven guessing methods, then design multiple parameterized hybrid guessing methods (collectively referred to as hyPassGu) composed of multiple models based on the framework for guessing practice. We also evaluate these hybrid guessing methods using four large-scale password datasets (more than 150 million passwords in total) leaked from real websites. The experimental results show that hyPassGu constructed by different methods surpass the guessing efficiency of the single method, and surpass the best efficiency of the single method by 1.52%~35.49% under 10\+\{10\} guesses. Finally, the comparative experimental results under different guesses show that the performance of the optimal allocation strategy proposed in this paper is stably better than the average allocation strategy and random allocation strategy, and has a relative improvement of 16.87% on the password dataset with the largest dispersion. Moreover, the more diversified hybrid method shows better guessing efficiency as a whole.
  • Related Articles

    [1]Zhang Yuhong, Zhi Wenwu, Li Peipei, Hu Xuegang. Semi-Supervised Method for Cross-Lingual Word Embedding Based on an Adversarial Model with Double Discriminators[J]. Journal of Computer Research and Development, 2023, 60(9): 2127-2136. DOI: 10.7544/issn1000-1239.202220036
    [2]Liu Linfeng, Yu Zixing, Zhu He. A Link Prediction Method Based on Gated Recurrent Units for Mobile Social Network[J]. Journal of Computer Research and Development, 2023, 60(3): 705-716. DOI: 10.7544/issn1000-1239.202110432
    [3]Ma Ang, Yu Yanhua, Yang Shengli, Shi Chuan, Li Jie, Cai Xiuxiu. Survey of Knowledge Graph Based on Reinforcement Learning[J]. Journal of Computer Research and Development, 2022, 59(8): 1694-1722. DOI: 10.7544/issn1000-1239.20211264
    [4]Wang Honglin, Yang Dan, Nie Tiezheng, Kou Yue. Attributed Heterogeneous Information Network Embedding with Self-Attention Mechanism for Product Recommendation[J]. Journal of Computer Research and Development, 2022, 59(7): 1509-1521. DOI: 10.7544/issn1000-1239.20210016
    [5]Yang Yanjie, Wang Li, Wang Yuhang. Rumor Detection Based on Source Information and Gating Graph Neural Network[J]. Journal of Computer Research and Development, 2021, 58(7): 1412-1424. DOI: 10.7544/issn1000-1239.2021.20200801
    [6]Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan. Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter[J]. Journal of Computer Research and Development, 2020, 57(4): 778-790. DOI: 10.7544/issn1000-1239.2020.20190875
    [7]Fang Yang, Zhao Xiang, Tan Zhen, Yang Shiyu, Xiao Weidong. A Revised Translation-Based Method for Knowledge Graph Representation[J]. Journal of Computer Research and Development, 2018, 55(1): 139-150. DOI: 10.7544/issn1000-1239.2018.20160723
    [8]Yang Lin, Zhang Libo, Luo Tiejian, Wan Qiyang, Wu Yanjun. Knowledge Schematization Method Based on Link and Semantic Relationship[J]. Journal of Computer Research and Development, 2017, 54(8): 1655-1664. DOI: 10.7544/issn1000-1239.2017.20170177
    [9]Liu Zhiyuan, Sun Maosong, Lin Yankai, Xie Ruobing. Knowledge Representation Learning: A Review[J]. Journal of Computer Research and Development, 2016, 53(2): 247-261. DOI: 10.7544/issn1000-1239.2016.20160020
    [10]Wang Yanshi, Wang Wei, Liu Zhaohui, Wei Jun, Huang Tao. A Mechanism for Transparent Data Caching[J]. Journal of Computer Research and Development, 2015, 52(4): 907-917. DOI: 10.7544/issn1000-1239.2015.20131910
  • Cited by

    Periodical cited type(2)

    1. 张学旺,雷响. 基于层次化群签名的联盟链身份隐私保护方案. 信息安全研究. 2024(12): 1160-1164 .
    2. 夏莹杰,朱思雨,刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究. 通信学报. 2023(04): 111-123 .

    Other cited types(6)

Catalog

    Article views PDF downloads Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return