A Framework for Server Authentication using Communication Protocol Dialects

02/01/2022
by   Kailash Gogineni, et al.
0

In today's world, computer networks have become vulnerable to numerous attacks. In both wireless and wired networks, one of the most common attacks is man-in-the-middle attacks, within which session hijacking, context confusion attacks have been the most attempted. A potential attacker may have enough time to launch an attack targeting these vulnerabilities (such as rerouting the target request to a malicious server or hijacking the traffic). A viable strategy to solve this problem is, by dynamically changing the system properties, configurations and create unique fingerprints to identify the source. However, the existing work of fingerprinting mainly focuses on lower-level properties (e.g IP address), and only these types of properties are restricted for mutation. We develop a novel system, called Verify-Pro, to provide server authentication using communication protocol dialects, that uses a client-server architecture based on network protocols for customizing the communication transactions. For each session, a particular sequence of handshakes will be used as dialects. So, given the context, with the establishment of a one-time username and password, we use the dialects as an authentication mechanism for each request (e.g get filename in FTP) throughout the session, which enforces continuous authentication. Specifically, we leverage a machine learning approach on both client and server machines to trigger a specific dialect that dynamically changes for each request. We implement a prototype of Verify-Pro and evaluate its practicality on standard communication protocols FTP, HTTP internet of things protocol MQTT. Our experimental results show that by sending misleading information through message packets from an attacker at the application layer, it is possible for the recipient to identify if the sender is genuine or a spoofed one, with a negligible overhead of 0.536

READ FULL TEXT
research
06/27/2022

Comment on "Provably secure biometric-based client-server secure communication over unreliable networks"

In key agreement protocols, the user will send a request to the server a...
research
10/07/2021

MPD: Moving Target Defense through Communication Protocol Dialects

Communication protocol security is among the most significant challenges...
research
06/25/2023

Universal Session Protocol: A Novel Approach to Session Management

Currently, the TCP/IP model enables exploitation of vulnerabilities anon...
research
03/16/2020

Formal Methods Analysis of the Secure Remote Password Protocol

We analyze the Secure Remote Password (SRP) protocol for structural weak...
research
09/07/2021

A Just-In-Time Networking Framework for Minimizing Request-Response Latency of Wireless Time-Sensitive Applications

This paper puts forth a networking paradigm, referred to as just-in-time...
research
09/01/2021

Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks

Today, two-factor authentication (2FA) is a widely implemented mechanism...
research
09/21/2023

De-authentication using Ambient Light Sensor

While user authentication happens before initiating or resuming a login ...

Please sign up or login with your details

Forgot password? Click here to reset