DocumentCode
2532207
Title
Detecting Unauthorized Modification of HTTP Communication with Steganography
Author
Koutny, Tomas
Author_Institution
Fac. of Appl. Sci., Univ. of West Bohemia in Plzen, Plzen, Czech Republic
fYear
2010
fDate
9-15 May 2010
Firstpage
26
Lastpage
31
Abstract
HTTP does not secure its requests and responses. Using Man-in-the-Middle attack, it is possible to alter the HTTP communication, while it still would look authentic. This can be a problem, if you download data such as PGP key, TOR client, access banking services on-line, or when there is an interest to filter what you can read on the Internet. It should be noted that under particular circumstances, it is possible to attack HTTPS secured communication successfully. This paper proposes a steganography scheme that can be used to detect unauthorized modifications of HTTP communication.
Keywords
Internet; banking; steganography; telecommunication security; transport protocols; HTTP communication; HTTPS secured communication; Internet; PGP key; TOR client; banking services; man-in-the-middle attack; steganography; Access protocols; Banking; Computer networks; Cryptographic protocols; Cryptography; Information filtering; Network servers; Steganography; Web and internet services; Web server; HTTP; HTTPS; attack; cryptography; detection; steganography;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet and Web Applications and Services (ICIW), 2010 Fifth International Conference on
Conference_Location
Barcelona
Print_ISBN
978-1-4244-6728-0
Type
conf
DOI
10.1109/ICIW.2010.12
Filename
5476817
Link To Document