Nuevo modelo probabilístico en autenticación gráfica
Palabras clave:
probabilístico contraseñas, Autenticación gráfica modeloResumen
La autenticación es esencial en la seguridad de los modernos servicios digitales de procesamiento de información. Las contraseñas alfanuméricas son las más empleadas, pero poseen debilidades que las hacen vulnerables a diversos ataques basados en modelos probabilísticos. Una de las alternativas es la autenticación gráfica. Los modelos probabilísticos en autenticación gráfica se aplican para estimar la clave más probable a seleccionar, en cada imagen, por el usuario que se va a registrar. En este trabajo se propone un nuevo modelo probabilístico de autenticación gráfica, su principal aporte consiste en que permite cuantificar el grado de autenticidad de cada usuario. Se confirma experimentalmente que el modelo propuesto es efectivo y permite medir en la práctica el nivel de autenticidad de los usarios autenticados.Descargas
Citas
Iso-9126 software product evaluation – quality characteristics and guidelines for their use.
S Aggarwal, S Houshmand, and R Flood. Probabilistic password cracking system, 2016.
Bin. B., D.W. Zhu, M. Yang, and J.. Yan. Security implications of password discretization for click-based graphical passwords. In WWW, 2013.
K. Bicakci. Optimal Discretization for High-Entropy Graphical Passwords. T. PhD thesis, OBB University of Economics and Technology, Ankara, Turkey, 2007.
R. Biddle, S. Chiasson, and P.C. Van Oorschot. Graphical passwords: Learning from the first twelve years. ACM Computer Survey, 44(4):19:1–19:41, September 2012.
J.C. Birget, D. Hong, and N Memon. Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security, 1(3), Sep 2006.
J. Blocki, H. Benjamin, and Samson Z. On the economics of offline password cracking. In IEEE Symposium on Security and Privacy, volume 1, 2018.
E. B Borrego, P.E. Navarro, and C.M. Legón. Debilidades de los métodos de discretización para contraseñas gráficas. In Instituto de Criptografía. Sociedad Cubana de Matemática y Computación., editor, IV Seminario Científico Nacional de Criptografía. Universidad de la Habana, 2018.
W. E. Burr, D. F. Dodson, E. M. Newton, R. A. Perlner, W. T. Polk, S. Gupta, and E. A. Nabbus. Electronic authentication guideline: Recommendations of the national institute of standards and technology -. Technical report, U.S. Department of Commerce and National Institute of Standards and Technology, USA, 2012.
C. Castelluccia, M. DÃŒrmuth, and D. Perito. Adaptive password-strength meters from markov models. In 19th Annual Network & Distributed System Security Symposium, San Diego, United States, Feb 2012.
S. Chiasson, J. Srinivasan, R. Biddle, and P. C. van Oorschot. Centered discretization with application to graphical passwords. In Usability, Psychology, and Security, 2008.
H.C Chou, H.C. Lee, H. J Yu, F.P. Lai, K.H. Huang, and C.W. Hsueh. Password cracking based on learned patterns from disclosed passwords. International Journal of Innovative Computing, Information and Control, 9(2):821–839, 2013.
X.C. de Carnavalet and M. Mannan. From very weak to very strong: Analyzing password-strength meters. In 21st Annual Network and Distributed System Security Symposium. The Internet Society, 2014.
M. Devlin, J.R. Nurse, D. Hodges, M. Goldsmith, and S. Creese. Predicting graphical passwords. In Proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust -, volume 9190, pages 23–35, New York, NY, USA, 2015. Springer-Verlag New York, Inc.
W. Ding, Haibom C., P. Wang, X. Huang, and G. Jian. Zipfs law in passwords. IEEE Transactions on Information Forensics and Security, 12(11):2776 – 2791, 2017.
A. E. Dirik, L. F. Cranor, and J.C Birget. Modeling user choice in the passpoints graphical password scheme. In Proceedings of the 3rd Symposium on Usable Privacy and Security, pages 20–28, New York, NY, USA, 2007. ACM.
D. Freeman, S. Jain, M. Dürmuth, B. Biggio, and G. Giacinto. Who are you? A statistical approach to measuring user authenticity. In NDSS. The Internet Society, 2016.
M. Golla and M. DÃŒrmuth. On the accuracy of password strength meters. In Conference on Computer and Communications Security, Toronto, Canada, Oct 2018.
S. Houshmand and S. Aggarwal. Building better passwords using probabilistic techniques. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 109–118, New York, USA, 2012. ACM.
L. Jue Min, L. Yong Hao, N. Huey Wen, T. Soon Guan, Y. Li Ho, A. Azman, and L. Siong Hoe. Comparison of graphical password using iso 9126. Advanced Science Letters, 4:400–407, 2016.
P. Karmajit, N. Bhushan, D. Prasad-Mishra, and P. Priyadarsini-Satapathy. Cued-click point graphical password using circular tolerance to increase password space and persuasive features. In Proceedings of International Conference on Communication, Computing and Virtualization, volume 79, pages 561 – 568, 2016.
C.M. Legón, P.E. Navarro, E.A. Borrego, O. Rodríguez, and R. Socorro. Modelos probabilísticos de contraseñas alfanuméricas. In IV Seminario Científico Nacional de Criptografía. Universidad de la Habana, Noviembre 2018.
J. Ma, W. Yang, M. Luo, and N. Li. A study of probabilistic password models. In IEEE Symposium on Security and Privacy, volume 1, pages 689–704, 2014.
D. Malone and K. Maher. Investigating the distribution of password choices. Cryptography and Security, 2011.
D. Malone and K. Maher. Investigating the distribution of password choices. In Proceedings of the 21st International Conference on World Wide Web, pages 301–310, New York, NY, USA, 2012. ACM.
W. Melicher, B. Ur, S.M. Segreti, S. Komanduri, L. Bauer, N. Christin, and L. F Cranor. Fast, lean, and accurate: Modeling password guessability using neural networks. In Proceedings of the 25th USENIX Security Symposium, pages 10–12, 2016.
L.L. Morales and C.M. Legón. Estimación de la fortaleza de las contraseñas. Technical report, Facultad de Ingeniería Informática. Universidad Tecnológica de la Habana, 2014.
O. Rodríguez, C.M. Legón, and R. Socorro. Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica. Revista Cubana de Ciencias Informáticas, 12(Especial UCIENCIA):13–27, Sep 2018.
S. Salehi-Abari, J. Thorpe, and P.C. van Oorschot. On purely automated attacks and click-based graphical password. In Computer Security Applications Conference, 2008.
A. Shaikh, R. Pathan, R. Patel, and S. Rukaiya. Implementation of authentication using graphical password cloud computing. International Research Journal of Engineering and Technology, 5(5), 2018.
Sunil Shendage Swapnil, Prakash Dhainje, and Shivaji Yevale Ramesh. Cued click points: Graphical password authentication technique for security. International Journal of ComputerScience and Information Technologies, 5(2), 2014.
J. Shouling, Y. Shukun, W. Ting, L. Changchang, L. WeiHan, and B. Raheem. Pars: A uniform and open-source password analysis and research system. In Proceedings of the 31st Annual Computer Security Applications Conference, pages 321–330, New York, USA, 2015. ACM.
M. N. Todd. An investigation of machine learning for password evaluation. Master’s thesis, Arizona State University, 2016.
A Toledo, M García, C. M. Legón, and J. L. Morales. Caracterización de un atacante a sistemas de autenticación por contraseña. In Segurmática, 2014.
E. Walkup. The password problem. Technical report, Sandia National Laboratories, Albuquerque, United States, 2016.
D. Wang and P. Wang. On the implications of zipfs law in passwords. In European Symposium on Research in Computer Security, pages 11–131, 2016.
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password cracking using probabilistic contex-free grammars. In IEEE Symposium on Security and Privacy, pages 391–405, 2009.
D. L. Wheeler. zxcvbn: Low-budget password strength estimation. In Proceedings of the 25th USENIX Security Symposium, SEC’16, pages 157–173, Berkeley, CA, USA, 2016. USENIX Association.
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Passpoints: design and longitudinal evaluation of a graphical password system. International Journal of Human Computers Studies, 63(1):102–127, 2005.
Bi. B. Zhu, D. Wei, M. Yang, and J. Yan. Security implications of password discretization for click-based graphical passwords. In Proceedings of the 22Nd International Conference on World Wide Web, pages 1581–1591, New York, USA, 2013. ACM.
Descargas
Publicado
Versiones
Cómo citar
Número
Sección
Licencia
Derechos de autor 2019 Ciencias Matemáticas

Esta obra está bajo una licencia internacional Creative Commons Atribución 4.0.
Esta licencia permite copiar y redistribuir el material en cualquier medio o formato bajo los siguientes términos: se debe dar crédito de manera adecuada, no se puede hacer uso del material con propósitos comerciales, y si remezcla, transforma o crea a partir del material, no podrá distribuir el material modificado. Bajo la licencia mencionada, los autores mantienen los derechos de autor de su trabajo.

