🤖 AI Summary
Traditional password strength evaluators rely on static, rule-based heuristics and thus fail to detect prevalent weak password patterns (e.g., “P@ssw0rd1!”), fostering users’ false sense of security. To address this, we propose a novel random forest–based password strength scoring framework that jointly models Leet-normalized Shannon entropy, keyboard-layout traversal features, and character-level TF-IDF weighted n-grams—thereby capturing fine-grained semantic and behavioral weaknesses. We conduct a systematic empirical evaluation on a large-scale real-world password dataset, comparing our approach against SVM, CNN, and logistic regression baselines. Our model achieves 99.12% classification accuracy while maintaining strong interpretability. Crucially, it generates concrete, actionable security recommendations—e.g., specific character substitutions or length extensions—enabling practical, user-centric improvements. This advances the state of the art in both predictive performance and operational utility for real-world password security assessment.
📝 Abstract
Password security plays a crucial role in cybersecurity, yet traditional password strength meters, which rely on static rules like character-type requirements, often fail. Such methods are easily bypassed by common password patterns (e.g.,'P@ssw0rd1!'), giving users a false sense of security. To address this, we implement and evaluate a password strength scoring system by comparing four machine learning models: Random Forest (RF), Support Vector Machine (SVM), a Convolutional Neural Network (CNN), and Logistic Regression with a dataset of over 660,000 real-world passwords. Our primary contribution is a novel hybrid feature engineering approach that captures nuanced vulnerabilities missed by standard metrics. We introduce features like leetspeak-normalized Shannon entropy to assess true randomness, pattern detection for keyboard walks and sequences, and character-level TF-IDF n-grams to identify frequently reused substrings from breached password datasets. our RF model achieved superior performance, achieving 99.12% accuracy on a held-out test set. Crucially, the interpretability of the Random Forest model allows for feature importance analysis, providing a clear pathway to developing security tools that offer specific, actionable feedback to users. This study bridges the gap between predictive accuracy and practical usability, resulting in a high-performance scoring system that not only reduces password-based vulnerabilities but also empowers users to make more informed security decisions.