Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

User password repetitive patterns analysis and visualization

View through CrossRef
Purpose– Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the security of our systems. However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords. This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy.Design/methodology/approach– The authors develop a model to formalize the password repetitive problem and design efficient algorithms to analyze the repeat patterns. To help security practitioners to analyze patterns, the authors design and implement a lightweight, Web-based visualization tool for interactive exploration of password data.Findings– Through case studies on a real-world leaked password data set, the authors demonstrate how the tool can be used to identify various interesting patterns, e.g. shorter substrings of the same type used to make up longer strings, which are then repeated to make up the final passwords, suggesting that the length requirement of password policy does not necessarily increase security.Originality/value– The contributions of this study are two-fold. First, the authors formalize the problem of password repetitive patterns by considering both short and long substrings and in both directions, which have not yet been considered in past. Efficient algorithms are developed and implemented that can analyze various repeat patterns quickly even in large data set. Second, the authors design and implement four novel visualization views that are particularly useful for exploration of password repeat patterns, i.e. the character frequency charts view, the short repeat heatmap view, the long repeat parallel coordinates view and the repeat word cloud view.
Title: User password repetitive patterns analysis and visualization
Description:
Purpose– Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life.
The strength of passwords is therefore critical to the security of our systems.
However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords.
This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy.
Design/methodology/approach– The authors develop a model to formalize the password repetitive problem and design efficient algorithms to analyze the repeat patterns.
To help security practitioners to analyze patterns, the authors design and implement a lightweight, Web-based visualization tool for interactive exploration of password data.
Findings– Through case studies on a real-world leaked password data set, the authors demonstrate how the tool can be used to identify various interesting patterns, e.
g.
shorter substrings of the same type used to make up longer strings, which are then repeated to make up the final passwords, suggesting that the length requirement of password policy does not necessarily increase security.
Originality/value– The contributions of this study are two-fold.
First, the authors formalize the problem of password repetitive patterns by considering both short and long substrings and in both directions, which have not yet been considered in past.
Efficient algorithms are developed and implemented that can analyze various repeat patterns quickly even in large data set.
Second, the authors design and implement four novel visualization views that are particularly useful for exploration of password repeat patterns, i.
e.
the character frequency charts view, the short repeat heatmap view, the long repeat parallel coordinates view and the repeat word cloud view.

Related Results

Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
Mining Repetitive Patterns in Multimedia Data
Mining Repetitive Patterns in Multimedia Data
One of the focused themes in data mining research is to discover frequent and repetitive patterns from the data. The success of frequent pattern mining (Han, Cheng, Xin, & Yan,...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Machine Learning Based Password Strength Analysis
Machine Learning Based Password Strength Analysis
Passwords, as the most used method of authentication because to its ease of implementation, allow attackers to get access to the accounts owned by others by means of cracking passw...
Comparative analysis of identity management, access control, and authorization practices in public and private universities
Comparative analysis of identity management, access control, and authorization practices in public and private universities
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities....
Graphical Password Authentication
Graphical Password Authentication
A pattern password is an authentication system that works when a user selects images in a specific sequence displayed on a graphical user interface (GUI). For this reason, the grap...
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme...
Multimodal Emotion Recognition and Human Computer Interaction for AI-Driven Mental Health Support (Preprint)
Multimodal Emotion Recognition and Human Computer Interaction for AI-Driven Mental Health Support (Preprint)
BACKGROUND Mental health has become one of the most urgent global health issues of the twenty-first century. The World Health Organization (WHO) reports tha...

Back to Top