transport layer security
Recently Published Documents


TOTAL DOCUMENTS

192
(FIVE YEARS 44)

H-INDEX

19
(FIVE YEARS 2)

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3180
Author(s):  
Joonseo Ha ◽  
Heejun Roh

In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end, recent research efforts are directed toward malware detection and malware family classification for TLS-encrypted traffic. However, amongst their feature sets, the proposals to utilize the sequential information of each TLS session has not been properly evaluated, especially in the context of malware family classification. In this context, we propose a systematic framework to evaluate the state-of-the-art malware family classification methods for TLS-encrypted traffic in a controlled environment and discuss the advantages and limitations of the methods comprehensively. In particular, our experimental results for the 10 representations and classifier combinations show that the graph-based representation for the sequential information achieves better performance regardless of the evaluated classification algorithms. With our framework and findings, researchers can design better machine learning based classifiers.


2021 ◽  
Author(s):  
Ronaldo Serrano ◽  
Ckristian Duran ◽  
Trong-Thuc Hoang ◽  
Marco Sarmiento ◽  
Akira Tsukamoto ◽  
...  

Author(s):  
Suherman Suherman ◽  
Deddy Dikmawanto ◽  
Syafruddin Hasan ◽  
Marwan Al-Akaidi

<span>Transmission control protocol provides reliable communication between two or more parties. Each transmitted packet is acknowledged to make sure successful deliveries. Transport layer security protocols send security information exchange as TCP loads. As results, the handshaking stage experiences longer delay as TCP acknowledgement process has already been delay prone. Furthermore, the security message transfers may have their own risks as they are not well protected yet. This paper proposes TCP-embedded three pass protocol for dynamic key exchange. The key exchange is embedded into TCP headers so that transmission delay is reduced, and message transfer is secured. The proposed protocol was assessed on self network by using socket programming in lossless environment. The assessments showed that the proposed protocol reduced three-pass protocol message transfer delay up to 25.8% on lossless channel. The assessment on security also showed that TCP-embedded three pass protocol successfully secured each transmitted TCP load using a unique key; that is much securer than the compared method.</span>


2021 ◽  
Vol 11 (1) ◽  
pp. 6-11
Author(s):  
Achmad Sudrajat ◽  
Yoyok Heru Prasetyo ◽  
Mila Kusumawardani

Robot humanoid adalah robot yang memiliki bentuk seperti manusia yaitu memiliki tubuh dan kepala, dua tangan dan dua kaki yang memungkinkan dapat bergerak dan berinteraksi dengan lingkungan yang dibuat oleh manusia [1]. Pada sistem robot sepak bola humanoid yang digunakan saat ini masih menggunakan sistem Robot Operating System (ROS) saja, yang pada dasarnya di dalam sistem tersebut tanpa ada enkripsi atau pengaman data setiap kali komunikasi dilakukan dengan pengiriman dan permintaan atau yang biasa disebut Publish dan Subscribe. Dalam rangka pengembangan robot sepak bola humanoid, penelitian ini dirancang untuk “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) Sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI”. Yang didesain untuk beroperasi pada konektivitas dengan kualitas yang rendah, dengan network bandwidth yang mengamankan setiap node yang berjalan di dalam ROS yang didalamnya terdapat fitur untuk subscribe topik dan juga publish topik. Kemudian dengan tambahan kriptografi dapat menjaga agar data atau pesan tetap aman saat dikirimkan, dari pengirim ke penerima tanpa mengalami gangguan dari pihak ketiga. Menurut Bruce Scheiner dalam bukunya "Applied Cryptography", kriptografi adalah ilmu pengetahuan dan seni menjaga message- message agar tetap aman (secure). [2] Maka semua komunikasi dienkripsi dengan menggunakan Secure Sockets Layer (SSL), atau lebih spesifiknya Transport Layer Security (TLS).


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 2192
Author(s):  
Timothy Claeys ◽  
Mališa Vučinić ◽  
Thomas Watteyne ◽  
Franck Rousseau ◽  
Bernard Tourancheau

This paper presents a thorough comparison of the Transport Layer Security (TLS) v1.2 and Datagram TLS (DTLS) v1.2 handshake in 6TiSCH networks. TLS and DTLS play a crucial role in protecting daily Internet traffic, while 6TiSCH is a major low-power link layer technology for the IoT. In recent years, DTLS has been the de-facto security protocol to protect IoT application traffic, mainly because it runs over lightweight, unreliable transport protocols, i.e., UDP. However, unlike the DTLS record layer, the handshake requires reliable message delivery. It, therefore, incorporates sequence numbers, a retransmission timer, and a fragmentation algorithm. Our goal is to study how well these mechanisms perform, in the constrained setting of 6TiSCH, compared to TCP’s reliability algorithms, relied upon by TLS. We port the mbedTLS library to OpenWSN, a 6TiSCH reference implementation, and deploy the code on the state-of-the-art OpenMote platform. We show that, when the peers use an ideal channel, the DTLS handshake uses up to 800 less and completes 0.6 s faster. Nonetheless, using an unreliable communication link, the DTLS handshake duration suffers a performance penalty of roughly 45%, while TLS’ handshake duration degrades by merely 15%. Similarly, the number of exchanged bytes doubles for DTLS while for TLS the increase is limited to 15%. The results indicate that IoT product developers should account for network characteristics when selecting a security protocol. Neglecting to do so can negatively impact the battery lifetime of the entire constrained network.


Author(s):  
Jason Yapri ◽  
Rinkel Hananto

The term “hacker” has been spread around the world and has always been considered as a threat when we use the internet. We often hear hackers deface websites’ contents and break into system to steal private and confidential information, such as account’s username and password, credit card numbers and others. This is definitely an unethical behavior of irresponsible people who mostly aims to gain profit. However the term hacker, on the contrary actually originates from an expert computer technicians who tries to access the system to debug and fix security problems of the system. Nowadays there are dozens of websites out there and some of those websites have low level of security. Hacker can easily break through their system and steal their private confidential data but just because these websites have low level security, that doesn’t mean that it is ethical to break into someone’s system and read their data. It goes the same when someone entering other people’s house because the door was left open by the owner. As web development grows rapidly, security has become an essential part to make the website more secure and reliable. This is when a group of people decided to make a collaborative project on the implementation of SSL (Secure Socket Layer) and TLS (Transport Layer Security) that is available to be used by everyone. This project is called as OpenSSl and has been used by most of the websites in the internet today. What if this OpenSSL, which has been trusted and implemented by 2/3rd of the websites all around the world can be breached? Definitely it will attract dozens of hackers all around the world to do something unimaginably dangerous.


2021 ◽  
Vol 11 (1) ◽  
pp. 59-68
Author(s):  
Hamza Touil ◽  
Nabil El Akkad ◽  
Khalid Satori

Much of the Internet's communication is encrypted, and its content is only accessible at two endpoints, a client and a server. However, any encryption requires a key that must be negotiated without being revealed to potential attackers. The so-called TLS (Transport Layer Security) handshake is often used for this task without obviating that many fundamental parameters of TLS connections are transmitted explicitly. Thus, third parties have access to metadata, including information about the endpoints, how the connection is used. On the other hand, QoS is considered the central part of the communication used to judge the deliverable quality through several parameters (latency, jitter ...). This document describes a secure approach and meets mainly the requirements of quality of service on a communication channel (free, loaded, congested ...), using the robustness and flexibility of the TLS protocol represented on the characteristics of existing encryption keys on its list of "ciphers suites." We focused more particularly on the AES key (Advanced Encryption Standard), including the different sizes (128,192,256), given its resistance to various classical attacks (differential, linear, ...) and its lightness compared to other protocols such as DES, 3DES ... This method is useful in continuous communications in a time axis (video sequence, VOIP call...).


2021 ◽  
Vol 2 (1) ◽  
pp. 1-22
Author(s):  
Yoshimichi Nakatsuka ◽  
Andrew Paverd ◽  
Gene Tsudik

Security and privacy of the Internet Domain Name System (DNS) have been longstanding concerns. Recently, there is a trend to protect DNS traffic using Transport Layer Security (TLS). However, at least two major issues remain: (1) How do clients authenticate DNS-over-TLS endpoints in a scalable and extensible manner? and (2) How can clients trust endpoints to behave as expected? In this article, we propose a novel Private DNS-over-TLS (PDoT) architecture. PDoT includes a DNS Recursive Resolver (RecRes) that operates within a Trusted Execution Environment. Using Remote Attestation , DNS clients can authenticate and receive strong assurance of trustworthiness of PDoT RecRes. We provide an open source proof-of-concept implementation of PDoT and experimentally demonstrate that its latency and throughput match that of the popular Unbound DNS-over-TLS resolver.


2021 ◽  
Vol 9 (01) ◽  
pp. 127-132
Author(s):  
Sourabh Saroha ◽  

Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and stretch, commencing from hackers. The coordination supervisor is in authority for safekeeping the Linux packet. Underneath maximum system formations, operator appellations, open sesame, FTP / tel-net / r-sh guidelines and relocated documentations be able to be seized by everyone programmed in the identical environment. To overcome this problem the user or the server can use secure shell, secure FTP, or file transfer protocol with transport layer security. The operating system can be protected more securely by using the above protocols. The security of the linux modules can be protected by using security enhancement technique, trappings numerous measures to avert unlicensed coordination convention. The safe keeping structural design rummage-sale is called Flask, and delivers a spotless different protection strategy and implementation. This paper is a gestalt of the Flask architecture and the execution in Linux.


Sign in / Sign up

Export Citation Format

Share Document