Analysis and Simulation of Hyper Text Transfer Protocol at the Application Layer of the Internet

Author(s):  
Naing Naing Kyaw
Author(s):  
Meenakshi Suresh ◽  
P. P. Amritha ◽  
Ashok Kumar Mohan ◽  
V. Anil Kumar

In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security. Furthermore the world is becoming progressively digital by the passing of each minute.Alarge portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP). But in 2015, it underwent a consequential enhancement and was released as HTTP/2. HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACKbesides the properties of HTTP/1.1. These properties make it difficult for the eavesdroppers to monitor or fingerprint a website running on HTTP/2. This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. By monitoring a live network traffic, its properties with HTTP/2 is assessed. This study helps understand the different aspects of the protocol and its influence on the network and browsers.  


2020 ◽  
Vol 12 (1) ◽  
pp. 49
Author(s):  
Fandi Ali Mustika ◽  
Febryo Ponco Sulistyo ◽  
Chairul Anhar Tanof

Abstract The rapid development of Internet networks in offices, industries, homes, and universities, transforming the conventional system into modern, especially with the Internet. Therefore, it is very important to use a good authentication method to avoid unauthorized user access. Wireless network without authentication can harm users in their activities using Internet access. One of the most effective ways for secure wireless network authentication with Captive portals with Radius authentication method. Captive portals are web pages that control Hyper Text Transfer Protocol (HTTP) browser access to the Internet. The user who is in authentication is their MAC address. Radius is a service that authenticates and authorizes users to network and network infrastructure. This paper will discuss how to use RADIUS authentication with captive portals to manage user authentication on wireless networks. Built-in security mechanism in Wifi 802.11.x equipment to control who can associate to an Access Point (AP). The use of captive portal so that the AP works without configuration settings, so it does not burden the work of the AP itself.Keywords: Captive Portal, Radius, Authentication, Wireless Network Abstrak Perkembangan jaringan internet yang semakin pesat di kantor, industri, rumah, dan universitas, mengubah sistem konvensional menjadi modern, terutama dengan adanya internet. Oleh karena itu, sangat penting untuk menggunakan metode otentikasi yang baik untuk menghindari akses pengguna yang tidak sah. Wireless network tanpa otentikasi dapat membahayakan pengguna dalam aktivitas mereka dalam menggunakan akses internet. Salah satu cara yang paling efektif untuk otentikasi wireless network yang aman dengan Captive Portal dengan metode otentikasi Radius. Captive portal adalah halaman web yang mengkontrol Hyper Text Transfer Protocol (HTTP) akses browser ke internet. Pengguna yang di otentikasi adalah MAC address mereka. Radius adalah layanan yang mengotentikasi dan mengotorisasi pengguna ke jaringan dan infrastruktur jaringan. Mekanisme keamanan built-in di peralatan Wifi 802.11.x untuk mengontrol siapa saja yang dapat berasosiasi ke Access Point (AP). Penggunaan captive portal agar AP bekerja tanpa seting konfigurasi, sehingga tidak membebani kerja dari AP itu sendiri.Kata Kunci: Captive Portal, Radius, Otentikasi, Wireless Network


Author(s):  
S. Phani Praveen ◽  
T. Bala Murali Krishna ◽  
Sunil K. Chawla ◽  
CH Anuradha

Background: Every organization generally uses a VPN service individually to leather the actual communication. Such communication is actually not allowed by organization monitoring network. But these institutes are not in a position to spend huge amount of funds on secure sockets layer to monitor traffic over their computer networks. Objective: Our work suggests simple technique to block or detect annoying VPN clients inside the network activities. This method does not requires the network to decrypt or even decode any network communication. Method: The proposed solution selects two machine learning techniques Feature Tree and K-means as classifiction techniques which work on time related features. First, the DNS mapping with the ordinary characteristic of the transmission control protocol / internet protocol computer network stack is identified and it is not to be considered as a normal traiffic flow if the domain name information is not available. The process also examines non-standard utilization of hyper text transfer protocol security and also conceal such communication from hyper text transfer protocol security dependent filters in firewall to detect as anomaly in largely. Results: we define the trafic flow as normal trafic flow and VPN traffic flow. These two flows are characterized by taking two machine learning techniques Feature Tree and K-means. We have executed each experment 4 times. As a result, eight types of regular traffics and eight types of VPN traffics were represented. Conclusion: Once trafic flow is identified, it is classified and studied by machine learning techniques. Using time related features, the traffic flow is defined as normal flow or VPN traffic flow.


2015 ◽  
Author(s):  
Martin Fenner

Just like the rest of the internet, much of our scholarly infrastructure is built around the Hypertext Transfer Protocol (HTTP), increasingly HTTPS for security, and soon HTTP/2 for better performance. In this infrastructure Universal Resource Locators (URLs) ...


Author(s):  
Laura Carrea ◽  
Raul Almeida

The Internet architecture of today does not seem suited to the current Internet usage, as the application layer is more and more content-centric, while the network layer is ossified around the IP concept. In this chapter, the authors explore a redefinition of the whole Internet architecture where nothing is taken for granted, especially IP addresses. The review focuses on the forwarding and topology components of the EU FP7 PSIRP architecture and on a few of the problematic issues and the ongoing discussions around a pioneering clean-slate design of the way to organize networks.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


2013 ◽  
Vol 756-759 ◽  
pp. 2157-2162
Author(s):  
Xu Chao Chang ◽  
Chun Hong Zhang ◽  
Li Sun

The Web of Things (WoT) is a refinement of the Internet of Things by integrating heterogeneous devices not only into the Internet (the network), but into the Web (the application layer). With the expansion of applications and devices, WoT Gateway Middleware is bearing more and more pressure from data processing, and therefore the WoT gateway middleware takes more time to respond to the requests of applications. A data collecting and caching mechanism is an effective solution to this problem. In this paper, we begin by describing the gateway middleware architecture with the focus on data collecting and caching functionality. Then the data collecting and caching (DCC) functionality module is discussed in detail. The DCC module supports three kinds of data collecting and caching modes: fundamental mode, configurable mode and adaptive mode. We finally demonstrate how these three modes work. A SMART HOME system is developed as the implementation to verify and discuss the proposed mechanism.


Sign in / Sign up

Export Citation Format

Share Document