{"title":"一种全程WiFi安全感知软件系统","authors":"Heqing Huang, Yanjun Hu, Yan Ja, Shiliang Ao","doi":"10.1109/CIRSYSSIM.2017.8023201","DOIUrl":null,"url":null,"abstract":"A whole-process WiFi security perception software system is designed in this paper based on the analysis of client's wireless access process, it consists of three modules to protect user from security threats during the pre-connection, connection and after-connection. The system could detects WiFi environment and shows with 3D effect, marking the Rogue AP, which is found out by multi-factors analysis techniques. During the connection, it inspired by the idea of Fog Computing, sending fake traffic to protect PSK from sniffing. After connection, the system detects Deauth attack in time, and traces the attacker. Finally, The software functionalities is realized, all the suspicious points are displayed on the User Interface (UI). The corresponding experimental testing shows that it could protect the surf in the WiFi environment effectively.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A whole-process WiFi security perception software system\",\"authors\":\"Heqing Huang, Yanjun Hu, Yan Ja, Shiliang Ao\",\"doi\":\"10.1109/CIRSYSSIM.2017.8023201\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A whole-process WiFi security perception software system is designed in this paper based on the analysis of client's wireless access process, it consists of three modules to protect user from security threats during the pre-connection, connection and after-connection. The system could detects WiFi environment and shows with 3D effect, marking the Rogue AP, which is found out by multi-factors analysis techniques. During the connection, it inspired by the idea of Fog Computing, sending fake traffic to protect PSK from sniffing. After connection, the system detects Deauth attack in time, and traces the attacker. Finally, The software functionalities is realized, all the suspicious points are displayed on the User Interface (UI). The corresponding experimental testing shows that it could protect the surf in the WiFi environment effectively.\",\"PeriodicalId\":342041,\"journal\":{\"name\":\"2017 International Conference on Circuits, System and Simulation (ICCSS)\",\"volume\":\"72 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Circuits, System and Simulation (ICCSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIRSYSSIM.2017.8023201\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Circuits, System and Simulation (ICCSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIRSYSSIM.2017.8023201","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A whole-process WiFi security perception software system
A whole-process WiFi security perception software system is designed in this paper based on the analysis of client's wireless access process, it consists of three modules to protect user from security threats during the pre-connection, connection and after-connection. The system could detects WiFi environment and shows with 3D effect, marking the Rogue AP, which is found out by multi-factors analysis techniques. During the connection, it inspired by the idea of Fog Computing, sending fake traffic to protect PSK from sniffing. After connection, the system detects Deauth attack in time, and traces the attacker. Finally, The software functionalities is realized, all the suspicious points are displayed on the User Interface (UI). The corresponding experimental testing shows that it could protect the surf in the WiFi environment effectively.