Attacking HTTPS Secure Search Service through Correlation Analysis of HTTP Webpages Accessed

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Performance Analysis of Secure HTTP Protocol

Data security plays an essential role in today’s web service. Secure HTTP (HTTPS) is one of the popular protocols to transfer sensitive data over the Internet. This paper shows how the security affects performance compared to HTTP. Based on our preliminary measurements, the average response time ranges from 0.1 to 5 seconds, and from 6 to 8 seconds, for HTTP and HTTPS, respectively. Our experim...

متن کامل

Kernel HTTPS/TCP/IP stack for HTTP DDoS mitigation

Application layer HTTP DDoS attacks are usually mitigated by HTTP accelerators or HTTP load balancers. However, Linux socket interface used by the software doesn’t provide reasonable performance for extreme loads caused by DDoS attacks. Thus, HTTP accelerators are starting to bypass an OS and to use user space TCP/IP stacks. This paper discusses the drawbacks of the bypassing technique and expl...

متن کامل

Experimental Analysis of the Correlation of HTTP GET Invocations

In this paper we experimentally investigate if optimal retry times can be determined based on models that assume independence of successive tries. We do this using data obtained for HTTP GET. This data provides application-perceived timing characteristics for the various phases of web page download, including response times for TCP connection set-ups and individual object downloads. The data co...

متن کامل

HIGWGET-A Model for Crawling Secure Hidden WebPages

The conventional search engines existing over the internet are active in searching the appropriate information. The search engine gets few constraints similar to attainment the information seeked from a different sources. The web crawlers are intended towards a exact lane of the web.Web Crawlers are limited in moving towards a different path as they are protected or at times limited because of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2017

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2017.11.7.03