期刊文献+

基于机器学习技术的口令脆弱性评估 被引量:1

Password Vulnerability Assessment based on Machine Learning
下载PDF
导出
摘要 现有的口令脆弱性评估大多基于规则的方案,很容易绕开规则而得到不准确的评估值。因此,根据口令字符组成,基于自然语言处理中TF-IDF技术,进行口令字符特征到数值特征的转换,提出了基于机器学习的口令脆弱性评估方案。通过使用训练集添加标签的方法增加样本学习目标值,再使用逻辑回归算法进行模型训练,并在评估阶段基于该模型进行脆弱性评估。通过与测试样本口令强度与模型评估值误差分析表明,所提方案具有较高的准确度,且对一些简单口令进行实际评测,模型输出结果比较符合实际情况。 Most of the existing schemes for password vpulnerability assessments are based on basic rules,and it is easy to bypass the rulesand get inaccurate estimates.Therefore,according to the password character composition,withTF-IDF technology in natural language processing,and by converting password character features to numeric features,a password vulnerability assessment scheme based on machine learning is proposed.The sample learning target value is increased by adding a label to the training set,and then the model training is performed by using a logistic regression algorithm,andthe vulnerability assessmentbased on the model is done in the evaluation stage.Testingon the strength of sample password and the error of model evaluation valueindicates that the proposed scheme hasfairly high accuracy.The actual evaluation on some simple passwords shows that the output of the model is in good agreement with the actual situation.
作者 罗华容 程劲 LUO Hua-rong;CHENG Jin(Sichuan Scientific and Technical Information Institute,Chengdu Sichuan 610016,China)
出处 《通信技术》 2019年第3期707-710,共4页 Communications Technology
基金 四川省公益性科研院所基本科研项目~~
关键词 机器学习 口令安全 自然语言处理 TF-IDF 逻辑回归 machine learning password security natural language processing TF-IDF logistic regression
  • 相关文献

参考文献7

二级参考文献35

  • 1徐凤亚,罗振声.文本自动分类中特征权重算法的改进研究[J].计算机工程与应用,2005,41(1):181-184. 被引量:56
  • 2韦博成,马阳明.指数型回归模型参数置信域的曲率表示[J].工程数学学报,1995,12(1):1-10. 被引量:4
  • 3国雁萌,付强,颜永红.复杂噪声环境中的语音端点检测[J].声学学报,2006,31(6):549-554. 被引量:16
  • 4Yah J, Blackwell A, Anderson and security: Empirical results. Magazine, 2004, 2(5): 25-31.
  • 5R. Password memorability IEEE Security & Privacy Daniel V K. Foiling the cracker: A survey of, and improve- ments to, password security. Programming and Computer Software, 1992, 17(3): 158-166.
  • 6Bloom B. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1979, 13(7): 422-426.
  • 7Chris D, Ravi G. BApasswd: A new proactive password eheeker//Proceedings of the 16th National Computer Security Conference. Baltimore, USA, 1993:1-15.
  • 8Pham H P, Phan D D, Duong N T, et al. Password recoveryfor encrypted ZIP archives using GPUs//Proeeedings of the 2010 Symposium on Information and Communication Technology. Hanoi, Vietnam, 2010.. 27-28.
  • 9Miller G A. The magical number seven, plus or minus two: Limits on our capacity for processing Information. Psycho- logical Review, 1956, 63(2): 81-87.
  • 10Johnson G J. A distinctiveness model of serial learning. Psychological Review, 1991, 98(2): 204-217.

共引文献170

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部