VPN Traffic Detection in SSL-Protected Channel

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How Mature are Clientless SSL VPN

A Virtual Private Network (VPN) offers a secure connection over an insecure network such as the Internet. Driven by an ever expanding mobile workforce and by the need for a cheaper alternative to private leased lines, the security community responded with a variety of VPN solutions deployed in a diverse array of software and hardware. Traditional VPNs offer good netto-net (site-to-site) connect...

متن کامل

Geographically Secured SSL-VPN Using GPS

We are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, for critical applications, such as the military. A formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploi...

متن کامل

Password Interception in a SSL/TLS Channel

Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SSL/TLS. At Eurocrypt’02, Vaudenay presented vulnerabilities in padding schemes used for block ciphers in CBC mode. He used a side channel, namely error information in the padding verification. This attack was not possi...

متن کامل

Preventing SSL Traffic Analysis with Realistic Cover Traffic

As more sensitive information is transmitted over computer networks, there has been a steady increase in the deployment of encryption to protect data in-flight. Myriad encrypted network protocols have emerged [8, 2, 1] that enable various applications like encrypted browsing, VPNs, secure shells, and VoIP. Since the data payload of an encrypted protocol is protected by strong encryption, attack...

متن کامل

On Reducing Response Time for VPN Traffic

A successful migration from traditional private networks (PNs) to virtual private networks (VPNs) depends on the ability of VPNs to offer similar quality of service (QoS) guarantees. To approach this goal, we propose to use priority scheduling based on flow size differentiation at the edge devices of the VPN. We evaluate the shortest elapsed time (SET) scheduling policy and compare it to differ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2019

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2019/7924690