Alqaydi et al., 2018 - Google Patents
A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deploymentAlqaydi et al., 2018
View PDF- Document ID
- 999666850537876168
- Author
- Alqaydi L
- Yeun C
- Damiani E
- Publication year
- Publication venue
- International Conference on Applied Computing and Information Technology
External Links
Snippet
Some of the well-known vulnerabilities like DROWN, POODLE, and Heartbleed affect a subset of all possible configurations of protocols and cipher-suites in SSL/TLS protocol. Recently, new vulnerabilities are also frequently discovered and could be used to mount …
- 235000010956 sodium stearoyl-2-lactylate 0 title abstract 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agyekum et al. | A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain | |
EP3721603B1 (en) | System and method for creating decentralized identifiers | |
Ahmad et al. | Hybrid cryptographic approach to enhance the mode of key management system in cloud environment | |
KR20060100920A (en) | Trusted Third Party Authentication for Web Services | |
JP2017112592A (en) | System and method for encrypted transmission of web page | |
Darwish et al. | Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm | |
Wilson et al. | “To Share or not to Share” in Client-Side Encrypted Clouds | |
Shyamambika et al. | Attaining integrity, secured data sharing and removal of misbehaving client in the public cloud using an external agent and secure encryption technique | |
de Ruiter | A tale of the OpenSSL state machine: A large-scale black-box analysis | |
Walther et al. | RATLS: Integrating transport layer security with remote attestation | |
Stoianov et al. | Integrated security infrastructures for law enforcement agencies | |
Antony Saviour et al. | IPFS based file storage access control and authentication model for secure data transfer using block chain technique | |
Kumar et al. | HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment | |
Zubair et al. | A hybrid algorithm-based optimization protocol to ensure data security in the cloud | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
WO2024123889A1 (en) | Systems and methods for conducting and enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements | |
Nash et al. | Security analysis of google authenticator, microsoft authenticator, and authy | |
Alqaydi et al. | A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deployment | |
Singh et al. | Rest security framework for event streaming bus architecture | |
Yuvaraj et al. | Internet of things integrated with multi-level authentication for secured IoT data stream through TLS/SSL layer | |
KR20020083551A (en) | Development and Operation Method of Multiagent Based Multipass User Authentication Systems | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
Yagoub et al. | A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment | |
Joshua et al. | AN ENHANCED SOFTWARE AS A SERVICE (SAAS) ARCHITECTURAL MODEL FOR CLOUD BASED SECURITY USING HYBRID SYMMETRIC ALGORITHM. | |
Yeun et al. | A Modern Solution for Identifying, Monitoring, and Selecting Configurations for SSL/TLS Deployment |