SlideShare a Scribd company logo
1 of 14
Password Strength Analysis
through Support Vector Machine”


                By
         Sunil Kumar R.M
             Lecturer
         Department of CSE
               RLJIT
Overview
 Introduction.
 Password strength.
 Support vector machine.
 Feature extraction.
 Conclusion.
Introduction
 passwords are used for many purposes
    logging in to computer accounts.
    retrieving e-mail from servers.
    transferring funds.
    shopping online.
 Passwords are more sophisticated service-granting
  systems, such as Kerberos.
 passwords are needed for protecting secret information
  that cannot be remembered by the user (e.g. private keys)
  in authentication and encryption software that is
  becoming essential to many applications.
Contd..
 there is a real and growing threat of data thieves,
  hackers and other criminals taking advantage of
  people who aren't security conscious.

 organizations launch a multi-faceted defense against
  password breach. That begins with mandating that
  only secure passwords be used.
Password strength.
 Password strength is a measurement of the
  effectiveness of a password .

 The key to a strong password is length and complexity.
  very weak, weak, moderate or medium or good, strong
  and very strong.

 at least eight characters, including a mixture of upper-
  and

 lower-case and some numbers and special characters
Contd..
 Most of the survey results reveal that 10% to 15% of the
 user’s passwords used mixed case, numbers, and
 symbols.

 Commercial tools available for password strength
 checking include Google Password Meter (Google,
 2008), Microsoft password Checker (Microsoft, 2008)
 and The Password Meter (Password Meter, 2008)
Support vector machine
 SVMs maximize the margin around
  the separating hyperplane.
        A.k.a. large margin classifiers
 The decision function is fully
  specified by a subset of training
  samples, the support vectors.
 Solving SVMs is a quadratic
  programming problem
 Seen by many as the most successful
  current text classification method*
 The system automatically identifies a subset of
  informative points called support vectors and uses
  them to represent the separating hyper plane which is
  sparsely a linear combination of these points. Finally
  SVM solves a simple convex optimization problem.

 two class pattern recognition problem,
             yi = +1
             yi = -1.
 A training example (xi,yi) is called positive if yi = +1
  and negative otherwise.
FEATURE EXTRACTION
 Improving classification effectiveness, computational
  efficiency or both.
 passwords are generated using PC Tools Password
  Generator.
 A weight is assigned to each relevant feature. The
  twenty-seven descriptive features are created as a fixed
  length vector for password analysis.
 (Length of the password, Weight of the password,            Number of lowercase
 characters,    Lowercase character weight age,    Number of uppercase characters,
 Uppercase character weight age, Number of digits,        Digits weight age, Number
 of symbols,       Weight age of symbols, Number of middle number and symbols)
weighting method
 A weighting method is adopted for computing the
 strength of the password.
PASSWORD CLASSIFICATION
Conclusion

 This work describes the machine learning approach
 for determining the strength of the password. Support
 Vector Machine, a supervised pattern classification
 technique has been applied for training the password
 strength analysis model. Features are extracted from
 the set of 10,000 passwords of different categories to
 facilitate training and implementation.
Password strength svm

More Related Content

What's hot

13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network security
Network securityNetwork security
Network security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Program security
Program securityProgram security
Program security
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection project
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Security threats
Security threatsSecurity threats
Security threats
 
Daa
DaaDaa
Daa
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Cyber security
Cyber securityCyber security
Cyber security
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Bagging.pptx
Bagging.pptxBagging.pptx
Bagging.pptx
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and Lexeme
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 

Similar to Password strength svm

A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
 
Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication System
paperpublications3
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Kamal Spring
 

Similar to Password strength svm (20)

A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
H364752
H364752H364752
H364752
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Epas - Enterprise Password Assessment Solution
Epas - Enterprise Password Assessment SolutionEpas - Enterprise Password Assessment Solution
Epas - Enterprise Password Assessment Solution
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication System
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 

Password strength svm

  • 1. Password Strength Analysis through Support Vector Machine” By Sunil Kumar R.M Lecturer Department of CSE RLJIT
  • 2. Overview  Introduction.  Password strength.  Support vector machine.  Feature extraction.  Conclusion.
  • 3. Introduction  passwords are used for many purposes  logging in to computer accounts.  retrieving e-mail from servers.  transferring funds.  shopping online.  Passwords are more sophisticated service-granting systems, such as Kerberos.  passwords are needed for protecting secret information that cannot be remembered by the user (e.g. private keys) in authentication and encryption software that is becoming essential to many applications.
  • 4. Contd..  there is a real and growing threat of data thieves, hackers and other criminals taking advantage of people who aren't security conscious.  organizations launch a multi-faceted defense against password breach. That begins with mandating that only secure passwords be used.
  • 5. Password strength.  Password strength is a measurement of the effectiveness of a password .  The key to a strong password is length and complexity. very weak, weak, moderate or medium or good, strong and very strong.  at least eight characters, including a mixture of upper- and  lower-case and some numbers and special characters
  • 6. Contd..  Most of the survey results reveal that 10% to 15% of the user’s passwords used mixed case, numbers, and symbols.  Commercial tools available for password strength checking include Google Password Meter (Google, 2008), Microsoft password Checker (Microsoft, 2008) and The Password Meter (Password Meter, 2008)
  • 7. Support vector machine  SVMs maximize the margin around the separating hyperplane.  A.k.a. large margin classifiers  The decision function is fully specified by a subset of training samples, the support vectors.  Solving SVMs is a quadratic programming problem  Seen by many as the most successful current text classification method*
  • 8.  The system automatically identifies a subset of informative points called support vectors and uses them to represent the separating hyper plane which is sparsely a linear combination of these points. Finally SVM solves a simple convex optimization problem.  two class pattern recognition problem, yi = +1 yi = -1.  A training example (xi,yi) is called positive if yi = +1 and negative otherwise.
  • 9.
  • 10. FEATURE EXTRACTION  Improving classification effectiveness, computational efficiency or both.  passwords are generated using PC Tools Password Generator.  A weight is assigned to each relevant feature. The twenty-seven descriptive features are created as a fixed length vector for password analysis. (Length of the password, Weight of the password, Number of lowercase characters, Lowercase character weight age, Number of uppercase characters, Uppercase character weight age, Number of digits, Digits weight age, Number of symbols, Weight age of symbols, Number of middle number and symbols)
  • 11. weighting method  A weighting method is adopted for computing the strength of the password.
  • 13. Conclusion  This work describes the machine learning approach for determining the strength of the password. Support Vector Machine, a supervised pattern classification technique has been applied for training the password strength analysis model. Features are extracted from the set of 10,000 passwords of different categories to facilitate training and implementation.