How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels

碩士 === 國立高雄應用科技大學 === 資訊工程系 === 104 === With the increasing popularity of mobile devices, more and more security issues arise. In particular, malicious hot-spots can be easily set-up by hackers (even amateurs) and be placed in public places. Even, if the transmitted data are encrypted, they are stil...

Full description

Bibliographic Details
Main Authors: JHUANG, KUN-LIN, 莊昆霖
Other Authors: HSIAO CHUN-YUAN
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/d6r6rc
id ndltd-TW-104KUAS0392014
record_format oai_dc
spelling ndltd-TW-104KUAS03920142019-05-30T03:50:24Z http://ndltd.ncl.edu.tw/handle/d6r6rc How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels 利用多重通道來偵測及避免中間人攻擊之研究 JHUANG, KUN-LIN 莊昆霖 碩士 國立高雄應用科技大學 資訊工程系 104 With the increasing popularity of mobile devices, more and more security issues arise. In particular, malicious hot-spots can be easily set-up by hackers (even amateurs) and be placed in public places. Even, if the transmitted data are encrypted, they are still vulnerable to so-called Man-In- The-Middle Attack (MITMA). Security-aware users may use SSL/TLS pinning or Virtual Private Network (VPN) to prevent such attacks. However, most of browsers use not SSL/TLS pinning but HTTP Strict Transport Security (HSTS). Former is still vulnerable during the first connection, and the latter suffers from efficiency issue. In this paper, we propose a scheme to get the SSL/TLS certificate through multiple channels, and compare with schemes proposed by Dacosta et al. in 2012 and by Alicherry et al. in 2013, which all try to prevent the MITMA. The problem of Dacosta et al.’s scheme is the additional work to maintain a database for login accounts on the server side. On the other hand, Alicherry et al.’s scheme uses the Tor network for secure connection, but it cannot prevent attacks to the exiting node. Our scheme uses multiple safe channels to get the SSL/TLS certificate, and requires minimum installation on client side and nothing on the server side. HSIAO CHUN-YUAN 蕭淳元 2016 學位論文 ; thesis 65 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立高雄應用科技大學 === 資訊工程系 === 104 === With the increasing popularity of mobile devices, more and more security issues arise. In particular, malicious hot-spots can be easily set-up by hackers (even amateurs) and be placed in public places. Even, if the transmitted data are encrypted, they are still vulnerable to so-called Man-In- The-Middle Attack (MITMA). Security-aware users may use SSL/TLS pinning or Virtual Private Network (VPN) to prevent such attacks. However, most of browsers use not SSL/TLS pinning but HTTP Strict Transport Security (HSTS). Former is still vulnerable during the first connection, and the latter suffers from efficiency issue. In this paper, we propose a scheme to get the SSL/TLS certificate through multiple channels, and compare with schemes proposed by Dacosta et al. in 2012 and by Alicherry et al. in 2013, which all try to prevent the MITMA. The problem of Dacosta et al.’s scheme is the additional work to maintain a database for login accounts on the server side. On the other hand, Alicherry et al.’s scheme uses the Tor network for secure connection, but it cannot prevent attacks to the exiting node. Our scheme uses multiple safe channels to get the SSL/TLS certificate, and requires minimum installation on client side and nothing on the server side.
author2 HSIAO CHUN-YUAN
author_facet HSIAO CHUN-YUAN
JHUANG, KUN-LIN
莊昆霖
author JHUANG, KUN-LIN
莊昆霖
spellingShingle JHUANG, KUN-LIN
莊昆霖
How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
author_sort JHUANG, KUN-LIN
title How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
title_short How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
title_full How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
title_fullStr How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
title_full_unstemmed How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
title_sort how to detect and avoid man-in-the-middle attack by using multiple channels
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/d6r6rc
work_keys_str_mv AT jhuangkunlin howtodetectandavoidmaninthemiddleattackbyusingmultiplechannels
AT zhuāngkūnlín howtodetectandavoidmaninthemiddleattackbyusingmultiplechannels
AT jhuangkunlin lìyòngduōzhòngtōngdàoláizhēncèjíbìmiǎnzhōngjiānréngōngjīzhīyánjiū
AT zhuāngkūnlín lìyòngduōzhòngtōngdàoláizhēncèjíbìmiǎnzhōngjiānréngōngjīzhīyánjiū
_version_ 1719194365459431424