期刊文献+

基于属性拆分与数据挖掘的真实口令分析 被引量:5

Analysis of Real Password Based on Attributes Resolution and Data Mining
下载PDF
导出
摘要 目前对网络口令安全性的研究通常集中在通信协议和加密算法的安全性分析上,较少涉及用户设置口令行为本身。为此,提出一种新的口令分析方法。通过设置口令属性,对原始口令依次进行属性拆分、属性归类,采用Apriori算法对归类后的口令属性进行数据挖掘,获得用户设置口令的内在特征。实验结果表明,该方法能够有效地从CSDN泄露的口令中分析出真实用户设置口令的习惯。用户设置的口令中存在大量弱口令,纯数字口令占总量的45.03%,姓氏拼音与数字的组合构成口令的另一大部分,占13.79%。能够在24 min之内分析处理642万条口令,可有效应对海量口令数据。 Researches about network passwords security mainly focus on the analysis of the communication protocols and the encryption algorithm. There are few researches analyzing the behaviour of how users set their passwords. This paper proposes a new password analysis method by analyzing the attributions of passwords, having attributes resolution on original password, classifying attributions and applying Apriori algorithm on the result set of attributions classification by data mining and so on. It obtains the inherent characteristics of the password setting. Experimental results show that this method can effectively analyze the habits of real password setting from the passwords leaked by CSDN. A large number of weak passwords exist. Pure digital passwords account for 45.03%of the total. Passwords composed of family-name pinyin and digital account for a great majority of total passwords, this is 13.79%. It also demonstrates that the method is able to analyze 6.42 million passwords within 24 minutes, which shows that this method can effectively deal with the massive password data.
出处 《计算机工程》 CAS CSCD 2014年第7期254-257,共4页 Computer Engineering
基金 教育部新世纪优秀人才支持计划基金资助项目(NCET-12-0358) 上海市教委科研创新基金资助项目(12ZZ019)
关键词 口令安全 口令分析 真实口令 口令属性 数据挖掘 Apriori关联算法 password security password analysis real password password attributes data mining Apriori association algorithm
  • 相关文献

参考文献12

二级参考文献62

  • 1王丹,张浩,陆剑峰.针对高项频繁集的关联规则改进算法[J].计算机工程,2006,32(24):29-30. 被引量:5
  • 2孙义明,曾继东.数据挖掘技术及其应用[J].信息安全与通信保密,2007,29(8):80-82. 被引量:6
  • 3Agrawal R, Imielinski T, Swami A. Mining Association Rules between Sets of Items in Large Database[C]//Proceedings of the ACM SIGMOD Conference on Management of Data. Washington, USA: ACM Press, 1993.
  • 4GONG L. A security risk of depending on synchronized clocks[ J]. ACM SIGOPS Operating Systems Review, 1992, 26(1) : 49 -53.
  • 5YANG C C, WANG R C, CHANG T Y. An improvement of the Yang-Shieh password authentication schemes[ J]. Applied Mathematics and Computation, 2005, 162 (3): 1391-1396.
  • 6SUN H M, YEH H T. Further eryptanalysis of a password authentication scheme with smart cards[ J]. IEICE Transactions and Communications, 2003, E86-B(4) : 1412 - 1415.
  • 7LEE S W, KIM H S, YOO K Y. Efficient nonce-based remote user authentication scheme using smart cards[ J]. Applied Mathematics and Computation, 2005, 167 (1) : 355 -361.
  • 8SHIEH W G, WANG J M. Efficient remote mutual authentication and key agreement[J]. Computers and Security, 2006, 25 (1): 72-77.
  • 9FAN C I, CHAN Y C, ZHANG Z K. Robust remote authentication scheme with smart cards[J]. Computers and Security, 2005, 24 (8): 619-628.
  • 10CHEN Y C, YEH L Y. An efficient nonce-based authentication seheme with key agreement[ J]. Applied Mathematics and Computation, 2005, 169 (2): 982-994.

共引文献86

同被引文献12

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部