具有特定规则和图形处理单元的接入点密码分析的实证研究

Chia-Mei Chen, Tien-Ho Chang, G. Lai
{"title":"具有特定规则和图形处理单元的接入点密码分析的实证研究","authors":"Chia-Mei Chen, Tien-Ho Chang, G. Lai","doi":"10.1109/AsiaJCIS50894.2020.00029","DOIUrl":null,"url":null,"abstract":"Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units\",\"authors\":\"Chia-Mei Chen, Tien-Ho Chang, G. Lai\",\"doi\":\"10.1109/AsiaJCIS50894.2020.00029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.\",\"PeriodicalId\":247481,\"journal\":{\"name\":\"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS50894.2020.00029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS50894.2020.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由于WiFi的安全性经常被滥用,接入点是具有挑战性的。大多数接入点对公众开放,可能成为黑客的目标。最流行的黑客策略之一是控制密码,这很容易用GPU做到。本实证研究提出了三个主要部分来检验接入点的安全性,并表明位于公共场所的接入点是脆弱的。提出了捕获加密密码报文的方法、密码分析的图形处理器、密码分析的具体规则,并指出了AP网络的不安全性。从我们收集的经验数据来看,无线工作在真实场景中是不安全的。部分AP密码可以通过我们配备gpu的云服务器和特定区域设置的规则进行有效破解,一旦随机捕获加密密码数据包,就可以在任何地方进行密码模式分析。由此可见无线网络的脆弱性和弱点。这表明,不安全差距是由社会人为因素造成的,即所谓的惰性密码。揭示了无线网络不安全的真实证据,并对无线网络的保护提出了建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units
Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信