Security Investigation in Encrypted Environment

نویسنده

  • Fatih Kiliç
چکیده

Nowadays, a wide variety of applications are using encryption to protect their confidential data in network communication. Since currently available security tools are mainly developed for plaintext network transmission, encryption obstructs security analysis and protection. In this thesis, we elaborate on the challenges resulting from encrypted network communication. In fact, encryption does not stop intruders from exploiting application vulnerabilities. However several protection mechanisms, e.g. kernel-based, compilerbased or third-party libraries, help to mitigate the success of attacks. We examine the feasibility of attacks against vulnerable applications on modern systems to identify the need of additional protection mechanisms. One approach is the identification of the vulnerability in order to fix it. Security testing can be applied to analyse applications with common attack payloads. For applications using encryption, the analyst has to discover the encryption algorithm and the appropriate key first, in order to proceed with testing. Another approach is to inspect the network traffic for known attack signatures. However, inspecting network data of applications with an active end-to-end encryption is not feasible on the network level without increasing the attack surface. Host-based solutions can help here, but they are limited in their use cases and prone to local attacks. Analysing binary applications without having access to the source code is known as reverse engineering. The identification of specific locations inside the application is a very labour-intensive process, but necessary for further analysis. The contributions of our work are as follows. First, we propose a new method for exploiting vulnerabilities over the network to show that system-based or application-based protection mechanisms are not sufficient. Second, we provide a framework for analysing binaries using encrypted network communication, sustaining the end-to-end encryption. The developed modules of the framework allow us to intercept, extract, modify and inject plaintext data, which is transmitted encrypted over the network. We propose a generic method to analyse applications with encrypted network communication without breaking the end-to-end encryption. Using this framework, we create a data bridge for

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

Encryption Based Security Model for Cloud Environment

In recent day, the enormous usage of cloud services leads to much concerned on cloud security. This paper primarily considers the important aspect of cloud security based on encryption. The users perform secure search on cloud environment using this method. Data stored in cloud are encrypted which ensure the privacy of the user; the files are encrypted before uploading. At the time of searching...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017