[go: up one dir, main page]

Alqaydi et al., 2018 - Google Patents

A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deployment

Alqaydi et al., 2018

View PDF
Document ID
999666850537876168
Author
Alqaydi L
Yeun C
Damiani E
Publication year
Publication venue
International Conference on Applied Computing and Information Technology

External Links

Snippet

Some of the well-known vulnerabilities like DROWN, POODLE, and Heartbleed affect a subset of all possible configurations of protocols and cipher-suites in SSL/TLS protocol. Recently, new vulnerabilities are also frequently discovered and could be used to mount …
Continue reading at khazna.ku.ac.ae (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management

Similar Documents

Publication Publication Date Title
Agyekum et al. A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain
EP3721603B1 (en) System and method for creating decentralized identifiers
Ahmad et al. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
KR20060100920A (en) Trusted Third Party Authentication for Web Services
JP2017112592A (en) System and method for encrypted transmission of web page
Darwish et al. Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm
Wilson et al. “To Share or not to Share” in Client-Side Encrypted Clouds
Shyamambika et al. Attaining integrity, secured data sharing and removal of misbehaving client in the public cloud using an external agent and secure encryption technique
de Ruiter A tale of the OpenSSL state machine: A large-scale black-box analysis
Walther et al. RATLS: Integrating transport layer security with remote attestation
Stoianov et al. Integrated security infrastructures for law enforcement agencies
Antony Saviour et al. IPFS based file storage access control and authentication model for secure data transfer using block chain technique
Kumar et al. HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment
Zubair et al. A hybrid algorithm-based optimization protocol to ensure data security in the cloud
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
WO2024123889A1 (en) Systems and methods for conducting and enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements
Nash et al. Security analysis of google authenticator, microsoft authenticator, and authy
Alqaydi et al. A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deployment
Singh et al. Rest security framework for event streaming bus architecture
Yuvaraj et al. Internet of things integrated with multi-level authentication for secured IoT data stream through TLS/SSL layer
KR20020083551A (en) Development and Operation Method of Multiagent Based Multipass User Authentication Systems
Kumar et al. Realization of threats and countermeasure in Semantic Web services
Yagoub et al. A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment
Joshua et al. AN ENHANCED SOFTWARE AS A SERVICE (SAAS) ARCHITECTURAL MODEL FOR CLOUD BASED SECURITY USING HYBRID SYMMETRIC ALGORITHM.
Yeun et al. A Modern Solution for Identifying, Monitoring, and Selecting Configurations for SSL/TLS Deployment