Mostrar el registro sencillo del ítem

dc.contributor.authorPalacios Hielscher, Rafaeles-ES
dc.contributor.authorFariña Fernández-Portillo, Andreaes-ES
dc.contributor.authorSánchez Ubeda, Eugenio Franciscoes-ES
dc.contributor.authorGarcía de Zúñiga Hernández, Pabloes-ES
dc.date.accessioned2022-04-26T03:05:47Z
dc.date.available2022-04-26T03:05:47Z
dc.date.issued11/04/2022es_ES
dc.identifier.issn2169-3536es_ES
dc.identifier.uri10.1109/ACCESS.2022.3166175es_ES
dc.identifier.urihttp://hdl.handle.net/11531/67838
dc.descriptionArtículos en revistases_ES
dc.description.abstractes-ES
dc.description.abstractBREACH is a side-channel attack to HTTPS that allows an attacker to obtain victims’ credentials under certain conditions. An attacker with a privileged position on the network can guess character by character a secret session key just by analyzing the size of the responses returned by the server over HTTPS and encrypted. Heal the Breach (HTB) is the proposed technique to mitigate BREACH attack by randomly changing the size of server responses through a modified gzip library. The attacker needs a precision of one byte in the size of the responses to be able to determine if a guess character is part of the secret token. Since the modified gzip library introduces randomness in the size of the response, BREACH becomes ineffective. The only way to circumvent this protection is to make several requests and compute the average size of the response, which minimizes the random effect. Mathematical and experimental results show that, for a random variation of the size from 1 to 10 bytes, an attacker needs to analyze 500 times more packages to obtain enough accuracy and surpass this mitigation. However, if the number of requests increases it is easier to isolate and block the attack using standard Intrusion Detection Systems (IDS). Compared to other mitigations, the approach presented in this paper is very effective, easy to implement for all websites hosted in the server, and produces a negligible increase in normal traffic.en-GB
dc.format.mimetypeapplication/pdfes_ES
dc.language.isoen-GBes_ES
dc.sourceRevista: IEEE Access, Periodo: 1, Volumen: online, Número: , Página inicial: 40381, Página final: 40390es_ES
dc.subject.otherInstituto de Investigación Tecnológica (IIT)es_ES
dc.titleHTB: a very effective method to protect web servers against BREACH attack to HTTPSes_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.description.versioninfo:eu-repo/semantics/publishedVersiones_ES
dc.rights.holderes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.keywordses-ES
dc.keywordsBREACH, CRIME, gzip library, HTTPs, side-channel attacks.en-GB


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

  • Artículos
    Artículos de revista, capítulos de libro y contribuciones en congresos publicadas.

Mostrar el registro sencillo del ítem