首页> 外文会议>International Conference on Computer, Control, Electrical, and Electronics Engineering >Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout : Key Compromise Impersonation Attack as Study Case
【24h】

Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout : Key Compromise Impersonation Attack as Study Case

机译:通过使用TCP重传超时检测中间人攻击:以密钥折衷模拟攻击为研究案例

获取原文

摘要

A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired then the sender will assume that this segment has been lost. This paper proposed another use of the RTO concept in order to secure the TLS session. It calculates a Secure Session RTO or SSRTO which is based on RTO equation between the sender and receiver in a TLS protocol. It is assumed that the man in the middle is in need of the time factor in order to trigger a KCI attack. at the server side, by calculating the time needed to start a TLS Handshake Protocol, until TLS Record Protocol, and if it is found that it took an appreciable time we may assume that there is an attacker. The action in this case, is to cut off the session between the sender and the receiver.
机译:重传超时或RTO在TCP协议中起着重要作用,主要是为了实现可靠的传输。在TCP中,如果发送方发送了一个段,但未收到确认,并且RTO计时器已过期,则发送方将假定此段已丢失。本文提出了RTO概念的另一种用法,以保护TLS会话。它基于TLS协议中发送方和接收方之间的RTO公式,计算安全会话RTO或SSRTO。假定中间的人需要时间因素才能触发KCI攻击。在服务器端,通过计算启动TLS握手协议直到TLS记录协议所需的时间,如果发现花费了相当长的时间,我们可以假设存在攻击者。在这种情况下,操作是切断发送方和接收方之间的会话。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号