How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
碩士 === 國立高雄應用科技大學 === 資訊工程系 === 104 === With the increasing popularity of mobile devices, more and more security issues arise. In particular, malicious hot-spots can be easily set-up by hackers (even amateurs) and be placed in public places. Even, if the transmitted data are encrypted, they are stil...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/d6r6rc |
id |
ndltd-TW-104KUAS0392014 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104KUAS03920142019-05-30T03:50:24Z http://ndltd.ncl.edu.tw/handle/d6r6rc How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels 利用多重通道來偵測及避免中間人攻擊之研究 JHUANG, KUN-LIN 莊昆霖 碩士 國立高雄應用科技大學 資訊工程系 104 With the increasing popularity of mobile devices, more and more security issues arise. In particular, malicious hot-spots can be easily set-up by hackers (even amateurs) and be placed in public places. Even, if the transmitted data are encrypted, they are still vulnerable to so-called Man-In- The-Middle Attack (MITMA). Security-aware users may use SSL/TLS pinning or Virtual Private Network (VPN) to prevent such attacks. However, most of browsers use not SSL/TLS pinning but HTTP Strict Transport Security (HSTS). Former is still vulnerable during the first connection, and the latter suffers from efficiency issue. In this paper, we propose a scheme to get the SSL/TLS certificate through multiple channels, and compare with schemes proposed by Dacosta et al. in 2012 and by Alicherry et al. in 2013, which all try to prevent the MITMA. The problem of Dacosta et al.’s scheme is the additional work to maintain a database for login accounts on the server side. On the other hand, Alicherry et al.’s scheme uses the Tor network for secure connection, but it cannot prevent attacks to the exiting node. Our scheme uses multiple safe channels to get the SSL/TLS certificate, and requires minimum installation on client side and nothing on the server side. HSIAO CHUN-YUAN 蕭淳元 2016 學位論文 ; thesis 65 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立高雄應用科技大學 === 資訊工程系 === 104 === With the increasing popularity of mobile devices, more and more security issues arise. In particular, malicious hot-spots can be easily set-up by hackers (even amateurs) and be placed in public places. Even, if the transmitted data are encrypted, they are still vulnerable to so-called Man-In- The-Middle Attack (MITMA). Security-aware users may use SSL/TLS pinning or Virtual Private Network (VPN) to prevent such attacks. However, most of browsers use not SSL/TLS pinning but HTTP Strict Transport Security (HSTS). Former is still vulnerable during the first connection, and the latter suffers from efficiency issue.
In this paper, we propose a scheme to get the SSL/TLS certificate through multiple channels, and compare with schemes proposed by Dacosta et al. in 2012 and by Alicherry et al. in 2013, which all try to prevent the MITMA. The problem of Dacosta et al.’s scheme is the additional work to maintain a database for login accounts on the server side. On the other hand, Alicherry et al.’s scheme uses the Tor network for secure connection, but it cannot prevent attacks to the exiting node. Our scheme uses multiple safe channels to get the SSL/TLS certificate, and requires minimum installation on client side and nothing on the server side.
|
author2 |
HSIAO CHUN-YUAN |
author_facet |
HSIAO CHUN-YUAN JHUANG, KUN-LIN 莊昆霖 |
author |
JHUANG, KUN-LIN 莊昆霖 |
spellingShingle |
JHUANG, KUN-LIN 莊昆霖 How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels |
author_sort |
JHUANG, KUN-LIN |
title |
How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels |
title_short |
How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels |
title_full |
How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels |
title_fullStr |
How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels |
title_full_unstemmed |
How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels |
title_sort |
how to detect and avoid man-in-the-middle attack by using multiple channels |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/d6r6rc |
work_keys_str_mv |
AT jhuangkunlin howtodetectandavoidmaninthemiddleattackbyusingmultiplechannels AT zhuāngkūnlín howtodetectandavoidmaninthemiddleattackbyusingmultiplechannels AT jhuangkunlin lìyòngduōzhòngtōngdàoláizhēncèjíbìmiǎnzhōngjiānréngōngjīzhīyánjiū AT zhuāngkūnlín lìyòngduōzhòngtōngdàoláizhēncèjíbìmiǎnzhōngjiānréngōngjīzhīyánjiū |
_version_ |
1719194365459431424 |