Search results for "Transport Layer Security"
showing 3 items of 3 documents
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…
Testbed implementation of the meta-MAC protocol
2016
The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.