{"title":"具有特定规则和图形处理单元的接入点密码分析的实证研究","authors":"Chia-Mei Chen, Tien-Ho Chang, G. Lai","doi":"10.1109/AsiaJCIS50894.2020.00029","DOIUrl":null,"url":null,"abstract":"Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units\",\"authors\":\"Chia-Mei Chen, Tien-Ho Chang, G. Lai\",\"doi\":\"10.1109/AsiaJCIS50894.2020.00029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.\",\"PeriodicalId\":247481,\"journal\":{\"name\":\"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS50894.2020.00029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS50894.2020.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units
Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.