RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재

      공용 무선공유기 비밀번호 선정 방식의 위험성 분석

      한글로보기

      https://www.riss.kr/link?id=A102653323

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      In wireless network environments with wireless access points, many vulnerabilities and attack methods are reported due to easy access, and real damage cases have been reported. The purpose of this study figures out the risk of the password selection f...

      In wireless network environments with wireless access points, many vulnerabilities and attack methods are reported due to easy access, and real damage cases have been reported. The purpose of this study figures out the risk of the password selection for public wireless access points. For the purpose, we surveyed the previous researches on attacks of the wireless network system, protocols, and password-based authentication, and the problem of the user password selection also. We conducted a case study to figure out the risk for wireless access points, and proposed a guessing method with fewer than 20 attempts through the analysis of the current passwords. It is shown that the password of most public wireless access points in the other region can be easily guessed. In addition, we emphasized the risk of the way of choosing passwords by presenting an additional security threat scenario when the passwords are exposed.

      더보기

      참고문헌 (Reference)

      1 김경훈, "국내 웹 사이트 패스워드 미터 분석" 한국정보보호학회 26 (26): 757-767, 2016

      2 T. Karygiannis, "Wireless network security : 802. 11, bluetooth and handheld devices. 2002" National Institute of Standards and Technology 2009

      3 A. Das, "The Tangled Web of Password Reuse" 14 : 23-26, 2014

      4 S. W. Na, "Study on efficient expansion strategy of Wi-Fi" 30 (30): 3-12, 2013

      5 H. C. Jung, "Study on Security Reinforcement Method by Wireless Security Status Survey and Analysis" 13 (13): 2006

      6 I. P. Mavridis, "Real-life paradigms of wireless network security attacks" 112-116, 2011

      7 G. R. Begh, "Quantification of the effect of security on performance in wireless LANs" 57-62, 2009

      8 E. Tews, "Practical attacks against WEP and WPA" 79-86, 2009

      9 M. Weir, "Password cracking using probabilistic contextfree grammars" 391-405, 2009

      10 S. Gaw, "Password Management Strategies for Online Accounts" Usenix, ACM 44-55, 2006

      1 김경훈, "국내 웹 사이트 패스워드 미터 분석" 한국정보보호학회 26 (26): 757-767, 2016

      2 T. Karygiannis, "Wireless network security : 802. 11, bluetooth and handheld devices. 2002" National Institute of Standards and Technology 2009

      3 A. Das, "The Tangled Web of Password Reuse" 14 : 23-26, 2014

      4 S. W. Na, "Study on efficient expansion strategy of Wi-Fi" 30 (30): 3-12, 2013

      5 H. C. Jung, "Study on Security Reinforcement Method by Wireless Security Status Survey and Analysis" 13 (13): 2006

      6 I. P. Mavridis, "Real-life paradigms of wireless network security attacks" 112-116, 2011

      7 G. R. Begh, "Quantification of the effect of security on performance in wireless LANs" 57-62, 2009

      8 E. Tews, "Practical attacks against WEP and WPA" 79-86, 2009

      9 M. Weir, "Password cracking using probabilistic contextfree grammars" 391-405, 2009

      10 S. Gaw, "Password Management Strategies for Online Accounts" Usenix, ACM 44-55, 2006

      11 R. Veras, "On the Semantic Patterns of Passwords and their Security Impact" 2014

      12 S. Komanduri, "Of Passwords and People : Measuring the Effect of Password-Composition Policies" 2595-2604, 2011

      13 Mediadot Corp, "Mediadot Corp."

      14 "Mediadot Corp."

      15 "Leaked Password Lists, Skullsecurity"

      16 "John the ripper password cracker"

      17 B. Ur, "I added ‘!’ at the End to Make It Secure" : Observing Password Creation in the Lab" 123-140, 2015

      18 "Hashcat"

      19 K. Scarfone, "Guide to Enterprise Password Management" NIST Special Publication 800-118, 2009

      20 KISA, "Guide for selecting and using passwords"

      21 P. G. Kelley, "Guess again(and again and again) : Measuring password strength by simulating passwordcracking algorithms" 523-537, 2012

      22 "Financial Supervisory Service"

      23 A. Narayanan, "Fast dictionary attacks on passwords using time-space tradeoff" 364-372, 2005

      24 "Dropbox TechBlog, zxcvbn: realistic password strength estimation"

      25 J. H. Baek, "Domestic wireless LAN(WiFi)security management and policy guidelines" 21 (21): 44-50, 2011

      26 K. M. Lee, "DoS attack scenario through wireless router firmware vulnerability" 75-77, 2015

      27 H. J. Yoon, "Development of Mobile Apps for Checking Web Security Configurations of Wireless Access Points" 24 (24): 101-102, 2016

      28 W. H. Jeong, "Detecting and responding to security attacks on wireless routers" 33 (33): 87-93, 2016

      29 C. H. Son, "Analysis and Countermeasures of Security Vulnerabilities in Wireless Routers" 1193-1194, 2015

      30 C. Castelluccia, "Adaptive Password-Strength Meters from Markov Models" 2012

      31 J. Ma, "A study of probabilistic password models" 689-704, 2014

      32 D. Yin, "A research into the latent danger of WLAN" 1085-1090, 2011

      33 D. J. Ryu, "A Study on the vulnerability and analysis in the Wireless IoT Environments" 1093-1094, 2016

      34 D. Florencio, "A Large-Scale Study of Web Password Habits" 657-666, 2007

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2022 평가예정 재인증평가 신청대상 (재인증)
      2019-01-01 평가 등재학술지 유지 (계속평가) KCI등재
      2016-01-01 평가 등재학술지 유지 (계속평가) KCI등재
      2012-01-01 평가 등재학술지 유지 (등재유지) KCI등재
      2009-01-01 평가 등재학술지 선정 (등재후보2차) KCI등재
      2008-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2006-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.45 0.45 0.39
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.38 0.35 0.566 0.16
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼