The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units

Chia-Mei Chen, Tien-Ho Chang, G. Lai
{"title":"The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units","authors":"Chia-Mei Chen, Tien-Ho Chang, G. Lai","doi":"10.1109/AsiaJCIS50894.2020.00029","DOIUrl":null,"url":null,"abstract":"Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS50894.2020.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
具有特定规则和图形处理单元的接入点密码分析的实证研究
由于WiFi的安全性经常被滥用,接入点是具有挑战性的。大多数接入点对公众开放,可能成为黑客的目标。最流行的黑客策略之一是控制密码,这很容易用GPU做到。本实证研究提出了三个主要部分来检验接入点的安全性,并表明位于公共场所的接入点是脆弱的。提出了捕获加密密码报文的方法、密码分析的图形处理器、密码分析的具体规则,并指出了AP网络的不安全性。从我们收集的经验数据来看,无线工作在真实场景中是不安全的。部分AP密码可以通过我们配备gpu的云服务器和特定区域设置的规则进行有效破解,一旦随机捕获加密密码数据包,就可以在任何地方进行密码模式分析。由此可见无线网络的脆弱性和弱点。这表明,不安全差距是由社会人为因素造成的,即所谓的惰性密码。揭示了无线网络不安全的真实证据,并对无线网络的保护提出了建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs IoT-Malware Detection Based on Byte Sequences of Executable Files New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism 3D-Playfair Encrypted Message Verification Technology based on MD5
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1