2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018
DOI: 10.1109/dessert.2018.8409116
|View full text |Cite
|
Sign up to set email alerts
|

Decrypting SSL/TLS traffic for hidden threats detection

Abstract: The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting and decrypting traffic transmitted over SSL/TLS is developed, tested and proposed. The developed approach has been automated and can be used for remote listening of the network, which will allow to decrypt transmitted data in a mode close to real time.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 41 publications
(16 citation statements)
references
References 1 publication
1
14
0
1
Order By: Relevance
“…A qualitative method allows to perform a risk assessment faster, but the estimates and results are more subjective and do not provide a clear picture of the damage, costs and benefits of implementing ISMS [10]. It should be noted that at this time, the main approaches to information technology risk management are based on the requirements of the Information Management and Audit Standard Cobit v.5.0; Risk Management Guidelines for Information Technology NIST 800-30; ISO / IEC 27000 and ISO / IEC 31000 series standards [3], BSI-Standards from IT-Grundschutz, etc.…”
Section: B Qualitative Methodsmentioning
confidence: 99%
“…A qualitative method allows to perform a risk assessment faster, but the estimates and results are more subjective and do not provide a clear picture of the damage, costs and benefits of implementing ISMS [10]. It should be noted that at this time, the main approaches to information technology risk management are based on the requirements of the Information Management and Audit Standard Cobit v.5.0; Risk Management Guidelines for Information Technology NIST 800-30; ISO / IEC 27000 and ISO / IEC 31000 series standards [3], BSI-Standards from IT-Grundschutz, etc.…”
Section: B Qualitative Methodsmentioning
confidence: 99%
“…The proposed strategy was utilized for distant connection eavesdropping, enabling transmitted data to be decrypted in a near real-time mode. There have been two fundamental inspection mechanisms for SSL/TLS traffic, depending on what kind of pertinent information and certificates are obtainable and how the devices are installed on the network [47,48]. Figure 11 is the sample simulation of benign traffic while Figures 12-15 are the sample simulations of Neris botnets, Rbot botnets Donbot botnets and Sogou botnets, respectively.…”
Section: Dataset and Experimental Setupmentioning
confidence: 99%
“…HTTPS response time analysis from network traffic can be based on TLS session data decryption [9], [10], [19]. However, in most networking scenarios, decryption is not possible, and a blind traffic analysis is the only option.…”
Section: Https Analysismentioning
confidence: 99%