PassREfinder-FL: Privacy-Preserving Credential Stuffing Risk Prediction via Graph-Based Federated Learning for Representing Password Reuse between Websites

📅 2025-10-17
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the privacy-security trade-off arising from cross-site password reuse in credential stuffing attacks, this paper proposes a privacy-preserving framework for predicting password reuse risk. Methodologically, it first formalizes “cross-site password reuse relationships” and constructs a heterogeneous website graph; it then jointly leverages website feature embeddings and graph neural networks (GNNs) for link prediction, while integrating federated learning to enable decentralized model training—ensuring raw user credentials remain local and comply with privacy regulations. Evaluated on 360 million real-world breached account records, the framework achieves an F1-score of 0.9153, outperforming state-of-the-art GNN baselines by 4–11%, and supports generation of interpretable, actionable risk scores. Key contributions include: (i) a privacy-first, cross-domain risk modeling paradigm; and (ii) the first federated graph learning architecture specifically designed for credential stuffing defense.

Technology Category

Application Category

📝 Abstract
Credential stuffing attacks have caused significant harm to online users who frequently reuse passwords across multiple websites. While prior research has attempted to detect users with reused passwords or identify malicious login attempts, existing methods often compromise usability by restricting password creation or website access, and their reliance on complex account-sharing mechanisms hinders real-world deployment. To address these limitations, we propose PassREfinder-FL, a novel framework that predicts credential stuffing risks across websites. We introduce the concept of password reuse relations -- defined as the likelihood of users reusing passwords between websites -- and represent them as edges in a website graph. Using graph neural networks (GNNs), we perform a link prediction task to assess credential reuse risk between sites. Our approach scales to a large number of arbitrary websites by incorporating public website information and linking newly observed websites as nodes in the graph. To preserve user privacy, we extend PassREfinder-FL with a federated learning (FL) approach that eliminates the need to share user sensitive information across administrators. Evaluation on a real-world dataset of 360 million breached accounts from 22,378 websites shows that PassREfinder-FL achieves an F1-score of 0.9153 in the FL setting. We further validate that our FL-based GNN achieves a 4-11% performance improvement over other state-of-the-art GNN models through an ablation study. Finally, we demonstrate that the predicted results can be used to quantify password reuse likelihood as actionable risk scores.
Problem

Research questions and friction points this paper is trying to address.

Predicts credential stuffing risks across websites using password reuse relations
Preserves user privacy through federated learning without sharing sensitive data
Quantifies password reuse likelihood as actionable risk scores for websites
Innovation

Methods, ideas, or system contributions that make the work stand out.

Graph neural networks predict password reuse risks
Federated learning preserves user privacy across websites
Link prediction models password reuse as graph edges
🔎 Similar Papers
No similar papers found.
J
Jaehan Kim
KAIST, 291 Daehak-ro, Yuseong-gu, Daejeon, 34141, Republic of Korea
Minkyoo Song
Minkyoo Song
KAIST
AI SecurityLLM Security
Minjae Seo
Minjae Seo
KAIST
AI SecurityNetwork Security
Youngjin Jin
Youngjin Jin
KAIST
S
Seungwon Shin
KAIST, 291 Daehak-ro, Yuseong-gu, Daejeon, 34141, Republic of Korea
J
Jinwoo Kim
Kwangwoon University, 20 Kwangwoon-ro, Nowon-gu, Seoul, 01897, Republic of Korea