Essays about: "transport security layer TLS"

Showing result 1 - 5 of 23 essays containing the words transport security layer TLS.

  1. 1. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhe Wang; [2021]
    Keywords : Intra-server load balancing; QUIC protocol; Connection migration; BPF; Connection management; Lastbalansering mellan servern; QUIC protokoll; Anslutningsmigrering; BPF; Anslutningshantering;

    Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE

  2. 2. Protocol-aware fuzzing of DTLS

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Rahbar Ghori; [2021]
    Keywords : ;

    Abstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE

  3. 3. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Martin Lindblom; [2021]
    Keywords : Fingerprint Attack; Privacy; Transport Layer Security; TLS; Real-World Scenario; News Websites; News Articles; Proxy-Less Labelling Heuristic; Transmission Control Protocol; TCP; Internal Pages; Automatic Data Collection;

    Abstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE

  4. 4. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Edvin Kjell; Sebastian Frisenfelt; [2021]
    Keywords : TLS; HTTPS; HSTS; cipher suites; vulnerabilities;

    Abstract : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. READ MORE

  5. 5. Evaluation of Security Methods for the MQTT Protocol

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Victor Wolff; [2021]
    Keywords : DoS; MQTT; TLS; IPS; Energy consumption; DoS; MQTT; TLS; IPS; Energiförbrukning;

    Abstract : There is an increasing trend of Internet of Things (IoT) solutions, and more products are getting connected to the internet. It is therefore important to create a protected link to prevent malicious attacks. This report includes Transport Layer Security (TLS) to create a secure link for the Message Queuing Telemetry Transport (MQTT) protocol. READ MORE