首页> 外文期刊>Security and Communications Networks >The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures
【24h】

The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures

机译:最新的SSL安全攻击:起源,实施,评估和建议的对策

获取原文
获取原文并翻译 | 示例
           

摘要

Attacks have been targeting secure socket layer (SSL) from the time it was created especially because of its utmost importance in securing Web transactions. These attacks are either attacks exploiting vulnerabilities in the SSL protocol itself, or attacks exploiting vulnerabilities in the services that SSL uses, such as certificates and web browsers. While the attacks on SSL itself have been successful, at least in the context of academics or other research, attacks on the services that SSL uses have been successfully exploited in an actual commercial setting; the fact that makes these kinds of attacks extremely dangerous. In this paper, we give a brief overview of the attacks conducted on the implementation of SSL and we analyze in more details the recent attacks that exploit the services SSL uses. Most of these attacks are considered Man in the Middle (MitM) attacks. In particular, we explore the most recent five attacks targeting SSL: SSL sniffing, MD5 collide certificate, SSL striping, SSL Null prefix and online certificate status protocol (OCSP) attack. We discuss the origins of each attack and explain the typical environment that allows for such attacks to occur. We then highlight the implementation phase where we implemented some of the attacks and were able to catch logins, passwords, and any data transmitted between two parties. In addition, we implemented using, Java, our own parsers and decoders to extract the useful data from the captured files and decode them if needed. Since most of the discussed attacks target browsers and the way they manage certificates, we conducted an extensive evaluation on the rate of success of the SSL attacks when various browsers are used. The browsers that were considered are Internet explorer (IE), Mozilla Firefox, Opera, Safari, and Chrome. The alarming results show that all analyzed attacks except for SSL Sniffing can be performed on almost all browsers. Copyright ? 2011 John Wiley & Sons, Ltd.
机译:从创建安全套接字层(SSL)开始,攻击就针对它了,特别是因为它在保护Web事务中至关重要。这些攻击要么是利用SSL协议本身漏洞的攻击,要么是利用SSL所使用的服务(例如证书和Web浏览器)中的漏洞的攻击。尽管对SSL本身的攻击已经成功,但至少在学术界或其他研究的背景下,对SSL使用的服务的攻击已在实际的商业环境中成功利用;这一事实使这类攻击极为危险。在本文中,我们简要概述了针对SSL实施的攻击,并更加详细地分析了利用SSL使用的服务的最新攻击。这些攻击大多数被认为是中间人(MitM)攻击。特别是,我们探讨了针对SSL的最新五种攻击:SSL嗅探,MD5冲突证书,SSL条带化,SSL空前缀和在线证书状态协议(OCSP)攻击。我们讨论了每种攻击的起源,并解释了允许发生此类攻击的典型环境。然后,我们重点介绍实施阶段,在该阶段我们实施了一些攻击,并能够捕获登录名,密码以及两方之间传输的任何数据。此外,我们使用Java实现了自己的解析器和解码器,以从捕获的文件中提取有用的数据,并在需要时对其进行解码。由于讨论的大多数攻击都针对浏览器及其管理证书的方式,因此我们对使用各种浏览器时SSL攻击的成功率进行了广泛的评估。所考虑的浏览器是Internet Explorer(IE),Mozilla Firefox,Opera,Safari和Chrome。令人震惊的结果表明,除SSL Sniffing之外,所有已分析的攻击都可以在几乎所有浏览器上执行。版权? 2011年John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号