Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Traffic Facet Psychoanalysis through Cryptography for an Attack


Affiliations
1 Department of CSE, A.V.C. College of Engineering, India
     

   Subscribe/Renew Journal


The unbridled growth of the Internet and the network-based applications has contributed to enormous security leaks. Even the cryptographic protocols [1], which are used to provide secure communication, are often targeted by diverse attacks. Intrusion detection systems (IDSs) [2] are often employed to monitor network traffic and host[3] activities that may lead to unauthorized accesses and attacks against vulnerable services. To combat against attacks on encrypted protocols [4], we propose an anomaly-based detection system by using strategically distributed monitoring stubs (MSs) [5].. Upon detecting suspicious activities due to the deviations from these normal profiles, the MSs notify the victim servers, which may then take necessary actions.

Keywords

SSL, TLS, IDS, MS, SSH, VPN.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 164

PDF Views: 3




  • Traffic Facet Psychoanalysis through Cryptography for an Attack

Abstract Views: 164  |  PDF Views: 3

Authors

B. Muthulakshmi
Department of CSE, A.V.C. College of Engineering, India

Abstract


The unbridled growth of the Internet and the network-based applications has contributed to enormous security leaks. Even the cryptographic protocols [1], which are used to provide secure communication, are often targeted by diverse attacks. Intrusion detection systems (IDSs) [2] are often employed to monitor network traffic and host[3] activities that may lead to unauthorized accesses and attacks against vulnerable services. To combat against attacks on encrypted protocols [4], we propose an anomaly-based detection system by using strategically distributed monitoring stubs (MSs) [5].. Upon detecting suspicious activities due to the deviations from these normal profiles, the MSs notify the victim servers, which may then take necessary actions.

Keywords


SSL, TLS, IDS, MS, SSH, VPN.