Password Authentication Using Hopfield Neural Networks Shouhong Wang; Hai Wang Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Systematic Data Selection to Mine Concept Drifting Data Streams Wei Fan IBM T.J.Watson.
Pattern Association.
Introduction to Artificial Neural Networks
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Introduction to Training and Learning in Neural Networks n CS/PY 399 Lab Presentation # 4 n February 1, 2001 n Mount Union College.
1 Machine Learning: Lecture 10 Unsupervised Learning (Based on Chapter 9 of Nilsson, N., Introduction to Machine Learning, 1996)
Soft computing Lecture 6 Introduction to neural networks.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Data Mining Techniques Outline
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Introduction to Neural Networks John Paxton Montana State University Summer 2003.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
CSE 830: Design and Theory of Algorithms
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
SIMULATION. Simulation Definition of Simulation Simulation Methodology Proposing a New Experiment Considerations When Using Computer Models Types of Simulations.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
8. Data Integrity Techniques
Chapter 5 Data representation.
Authentication Approaches over Internet Jia Li
Bob can sign a message using a digital signature generation algorithm
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Simple Data Type Representation and conversion of numbers
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
1 Template-Based Classification Method for Chinese Character Recognition Presenter: Tienwei Tsai Department of Informaiton Management, Chihlee Institute.
Artificial Neural Networks
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
A Shaft Sensorless Control for PMSM Using Direct Neural Network Adaptive Observer Authors: Guo Qingding Luo Ruifu Wang Limei IEEE IECON 22 nd International.
Presented by Tienwei Tsai July, 2005
Foundations of Computer Science Computing …it is all about Data Representation, Storage, Processing, and Communication of Data 10/4/20151CS 112 – Foundations.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
COMPARISON OF IMAGE ANALYSIS FOR THAI HANDWRITTEN CHARACTER RECOGNITION Olarik Surinta, chatklaw Jareanpon Department of Management Information System.
Boltzmann Machine (BM) (§6.4) Hopfield model + hidden nodes + simulated annealing BM Architecture –a set of visible nodes: nodes can be accessed from outside.
Neural Networks and Fuzzy Systems Hopfield Network A feedback neural network has feedback loops from its outputs to its inputs. The presence of such loops.
IE 585 Associative Network. 2 Associative Memory NN Single-layer net in which the weights are determined in such a way that the net can store a set of.
Neural Networks Steven Le. Overview Introduction Architectures Learning Techniques Advantages Applications.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 1.
 Based on observed functioning of human brain.  (Artificial Neural Networks (ANN)  Our view of neural networks is very simplistic.  We view a neural.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Neural Text Categorizer for Exclusive Text Categorization Journal of Information Processing Systems, Vol.4, No.2, June 2008 Taeho Jo* 報告者 : 林昱志.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Over-Trained Network Node Removal and Neurotransmitter-Inspired Artificial Neural Networks By: Kyle Wray.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 9 Designing Databases 9.1.
Supervised Machine Learning: Classification Techniques Chaleece Sandberg Chris Bradley Kyle Walsh.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
A Kernel Approach for Learning From Almost Orthogonal Pattern * CIS 525 Class Presentation Professor: Slobodan Vucetic Presenter: Yilian Qin * B. Scholkopf.
High Throughput and Programmable Online Traffic Classifier on FPGA Author: Da Tong, Lu Sun, Kiran Kumar Matam, Viktor Prasanna Publisher: FPGA 2013 Presenter:
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
Soft Computing Lecture 15 Constructive learning algorithms. Network of Hamming.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Robodog Frontal Facial Recognition AUTHORS GROUP 5: Jing Hu EE ’05 Jessica Pannequin EE ‘05 Chanatip Kitwiwattanachai EE’ 05 DEMO TIMES: Thursday, April.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
A Document-Level Sentiment Analysis Approach Using Artificial Neural Network and Sentiment Lexicons Yan Zhu.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Pattern Recognition Lecture 20: Neural Networks 3 Dr. Richard Spillman Pacific Lutheran University.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Advisor : Dr. Hsu Graduate : Yu Cheng Chen Author: Michael.
Cryptographic Hash Function
Outline Introduction Characteristics of intrusion detection systems
CS 101 – Sept. 4 Number representation Integer Unsigned √ Signed √
Boltzmann Machine (BM) (§6.4)
ONLINE SECURE DATA SERVICE
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Learning and Memorization
Presentation transcript:

Password Authentication Using Hopfield Neural Networks Shouhong Wang; Hai Wang Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on Volume: 38, Issue: 2 Publication Year: 2008 Speaker:Hong-Ji Wei

Outline 1.Introduction 2.layered neural network(LNN) 3.Pattern Recall by Hopfield Neural Networks(HNN) 4.New Password Authentication Scheme 5.Experiments 6.Conclusion

1. Introduction Computer security has been one of the most important issues in the information technology era. Among many computer access control techniques password authentication has been widely used for a long time A common password authentication approach is the use of verification tables

1. Introduction User k User(ID k,PW k ) UsernIDPassword ID k F(PW k ) Response Result Hacker(ID f,F(PW f )) Hacker Verification tables ID f F(PW f )

2. layered neural network(LNN) To avoid this problem, a layered neural network scheme has been proposed for password authentication ID k PW k DBIV k User k Weight Weight k Weight tables ykyk W1 W2 W3 DBIV = desired binary integer vector(e.g. [0,0,1,1]) Neural Save

2.1. Advantages of LNN 1)If hacker want to break into the system by modifying the neural network weights an intruder must figure out all existing valid IDs and passwords, and retrain the neural network to accommodate the new forged passwords 2)There would be fewer restrictions on the user’s choice of passwords 3)It is easy for the system to add other features (e.g., permission for accessing a specific server) to the training data set. 4)The log-in process takes an insignificant amount of time to verify the user ID and password.

2.1. Disadvantages of LNN 1)The training time for the layered neural networks is extremely long. When a new user is added to the system or a user password is changed, the layered neural network must be retrained requiring more than 5 min for a small system with 50 users or more than 30 min for a small system with 100 users 2)The output of the layered neural network will rarely be a discrete binary integer. For instance, suppose that the desired binary integer vector is [0, 0, 1, 1]. layered neural network output is often considered to be the desired vector. [ , , , ]

3. Pattern Recall by Hopfield Neural Networks(HNN) 1)Relevant Characteristics of HNN 2)Major Issue of Pattern Recall 3)Approach to the Pattern Recall Issue

3. 1. Relevant Characteristics of HNN …….. ij N yiyi y i+1 y i+2 yNyN w ij During the pattern recall phase, y i is set to the unknown input pattern, and a computation is performed using

This study examines password authentication through pattern recall If the output of this HNN execution is the same as the input, the pattern has been seen before(legal pattern) The recall quality is highly dependent upon the infor- mational capacity of the HNN that is referred to as the quantity of patterns that the HNN can store HNN can precisely recall every pattern when the informational capacity is large enough Major Issue of Pattern Recall

To improve the recall performance of an HNN, we must increase its information capacity and make the patterns sparsely Suppose that the patterns consist of three binary digits (e.g., [1, 0, 1]),the minimal number of nodes of HNN needed for recalling these patterns is 3 For example, if the node is 7, the original 3-bit patterns would be sparsely coded as 7-bit patterns such as [0, 1, 0, 0, 0, 1, 0] Approach to the Pattern Recall Issue

4. New Password Authentication Scheme The authentication scheme includes three major procedures 1)Registration 2)Log-in authorization 3)Password change

4.1. Registration

4.2. Log-in Authorization

When the user needs or wants to change the password 1)log-in authorization procedure is executed to allow the access to the system 2)the system executes the registration procedure to register the new password 3)system deletes the old password by subtracting the weights of the HNN based on U k 4.3. Password Change

5. Experiments There have two simulation experiments were conducted in experiments section in this paper 1)Computational Time for Registration 2)Performance on Passwords With Similar Character Sequences

Suppose that a user ID and its encrypted password contain characters of the set [A–Z, a–z, 0–9]. 6 bits are sufficient for representing one character Assume that a user ID and the encrypted password contains four characters Accordingly, 48 bits are sufficient to represent 248 (about 200 trillion) pairs of user ID and encrypted passwords 5.1.Computational Time for Registration

An HNN with 95 nodes was constructed for the simulation and was trained by the 10 million sample points that repre- sented legal users’ ID and passwords 5.1.Computational Time for Registration

In real life, passwords are not random. Many passwords have similar character sequences In this experiment, 1 million legal users’ ID and passwords and 1 million illegal users’ ID and passwords were generated and every 1000 legal users’ ID and passwords and 1000 illegal users’ ID and passwords had the same 36-bit sequence within the entire 48-bit sequence of the encrypted passwords 5.2. Performance on Passwords With Similar Character Sequences

The purpose of our experiment was to show the true power of the Reed-Solomon coding algorithm to separate similar sequences in the sparse space and make them dissimilar en- ough for inputs to the HNN The registration process of each user’s ID and password wa- s always successful. This success indicates that the probability of registration fa- ilures for the same user is close to zero 5.2. Performance on Passwords With Similar Character Sequences

This paper shows that an HNN-based authentication scheme can effectively be used for access authentication in the open computing environment The authentication scheme incorporating the use of HNN can recall information for a legal user’s ID and password instantly and accurately Our experiments have demonstrated the usefulness and robustness of the proposed authentication scheme 6. Conclusion