2021
DOI: 10.1109/access.2021.3050239
|View full text |Cite
|
Sign up to set email alerts
|

Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT

Abstract: In this paper, to increase the attack success rate, we analyzed the distribution of all collected keyboard data based on the distance of time and keyboard scancode data, which presents the crucial data from the previous study. To achieve this, we derived time-distance based features that have higher attack success rates than in previous studies. The proposed attack method defines 6 features, and evaluates the performance based on 18 datasets. For performance evaluation, the accuracy, precision, recall, F1-scor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…This technique works even if an attacker carries out a keyboard data attack such as the one using the direct polling-based attack technique. Although this defense technique effectively responds to direct polling-based attack technique, it does not guarantee security due to the following problems [ 18 , 19 ]. The security vulnerability that arises from random scan code generation-based defense technique is a vulnerability that arises from the C/D bit.…”
Section: Prior Knowledge and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This technique works even if an attacker carries out a keyboard data attack such as the one using the direct polling-based attack technique. Although this defense technique effectively responds to direct polling-based attack technique, it does not guarantee security due to the following problems [ 18 , 19 ]. The security vulnerability that arises from random scan code generation-based defense technique is a vulnerability that arises from the C/D bit.…”
Section: Prior Knowledge and Related Workmentioning
confidence: 99%
“…In this subsection, we describe the second prior research, research on improving keyboard data attack performance through feature expansion [ 19 ]. The goal of this research is to further improve the keyboard data attack performance of the first prior research by expanding the features.…”
Section: Prior Knowledge and Related Workmentioning
confidence: 99%
“…Among this personal information, it is very important to protect information such as passwords and CVC (Card Security Code) [3]. For this reason, vulnerabilities have been discovered in which attackers use attack tools, such as keyloggers, to steal keyboard data, i.e., steal authentication information inputted from the keyboard [4].…”
Section: Introductionmentioning
confidence: 99%