HTB: A Very Effective Method to Protect Web Servers Against BREACH Attack to HTTPs

نویسندگان

چکیده

BREACH is a side-channel attack to HTTPS that allows an attacker obtain victims’ credentials under certain conditions. An with privileged position on the network can guess character by secret session key just analyzing size of responses returned server over and encrypted. Heal Breach (HTB) proposed technique mitigate randomly changing through modified gzip library. The needs precision one byte in be able determine if part token. Since library introduces randomness response, becomes ineffective. only way circumvent this protection make several requests compute average which minimizes random effect. Mathematical experimental results show that, for variation from 1 10 bytes, analyze 500 times more packages enough accuracy surpass mitigation. However, number increases it easier isolate block using standard Intrusion Detection Systems (IDS). Compared other mitigations, approach presented paper very effective, easy implement all websites hosted server, produces negligible increase normal traffic.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Web Servers against Insider Attack

Too often, “security of Web transactions” reduces to “encryption of the channel”—and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator—but gives clients no basis for that trust. Furthermore, despite academic and industrial research in secure coprocessing, many in the computer science ...

متن کامل

Suspicious Score Based Mechanism to Protect Web Servers against Application Layer Distributed Denial of Service Attacks

Distributed Denial of Service attacks are becoming a serious issue for the developers and the users of the Internet. In recent times, the attackers are targeting the online applications and web services. Detecting such application level attacks are much challenging because the attack traffic mimics the legitimate behaviour. A more sophisticated mechanism is required to detect and mitigate such ...

متن کامل

Effective Learning to Rank Persian Web Content

Persian language is one of the most widely used languages in the Web environment. Hence, the Persian Web includes invaluable information that is required to be retrieved effectively. Similar to other languages, ranking algorithms for the Persian Web content, deal with different challenges, such as applicability issues in real-world situations as well as the lack of user modeling. CF-Rank, as a ...

متن کامل

Evaluation of a low-rate DoS attack against iterative servers

This paper presents a low-rate DoS attack that could be launched against iterative servers. Such an attack takes advantage of the vulnerability consisting in the possibility of forecasting the instant at which an iterative server will generate a response to a client request. This knowledge could allow a potential intruder to overflow application buffers with relatively low-rate traffic to the s...

متن کامل

A CSA Method for Assigning Client to Servers in Online Social Networks

This paper deals with the problem of user-server assignment in online social network systems. Online social network applications such as Facebook, Twitter, or Instagram are built on an infrastructure of servers that enables them to communicate with each other. A key factor that determines the facility of communication between the users and the servers is the Expected Transmission Time (ETT). A ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3166175