2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks 2012
DOI: 10.1109/cicsyn.2012.50
|View full text |Cite
|
Sign up to set email alerts
|

Simple and Lightweight HTTPS Enforcement to Protect against SSL Striping Attack

Abstract: SSL is a protocol for secured traffic connections. By using the SSL, HTTPS has been designed to prevent eavesdroppers and malicious users from web application services. However, man-in-the-middle attack techniques based on stripping and sniffing the HTTPS connections are still possible, causing security problems on web applications. Several scrip-kiddy tools to launch such attacks are easy to find and available on the Internet. In this paper, we therefore proposed a solution to protect against SSL striping att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…This is important in order to achieve secure connection and data flow throughout network as well as content protection and copyright management. Several research presented in [12,13] report security attacks and breaches of streaming media content. These bring necessity for more security protocols and various ways of protecting content in the network.…”
Section: B Http Streaming Environmentmentioning
confidence: 99%
“…This is important in order to achieve secure connection and data flow throughout network as well as content protection and copyright management. Several research presented in [12,13] report security attacks and breaches of streaming media content. These bring necessity for more security protocols and various ways of protecting content in the network.…”
Section: B Http Streaming Environmentmentioning
confidence: 99%
“…So, credential information are passed as plain text from the client to the attacker. HTTPS enforcer [26] uses a list of URLs that is kept at the client side. When a web page is requested and the communication between the web browser and web server is done over HTTP connection, the HTTP enforcer checks the list of URLs.…”
Section: Isan-https Enforcermentioning
confidence: 99%
“…A test was performed using for ISAN-HTTPS Enforcer [26] on a web server containing Intel XEON 2.40 GHz processor with a RAM of 2GB. The Operating system in the server was CentOS 5.3, web server was Apache/2.…”
Section: Resource Requirement Of Isan-https Enforcermentioning
confidence: 99%
See 2 more Smart Citations