• DocumentCode
    2532207
  • Title

    Detecting Unauthorized Modification of HTTP Communication with Steganography

  • Author

    Koutny, Tomas

  • Author_Institution
    Fac. of Appl. Sci., Univ. of West Bohemia in Plzen, Plzen, Czech Republic
  • fYear
    2010
  • fDate
    9-15 May 2010
  • Firstpage
    26
  • Lastpage
    31
  • Abstract
    HTTP does not secure its requests and responses. Using Man-in-the-Middle attack, it is possible to alter the HTTP communication, while it still would look authentic. This can be a problem, if you download data such as PGP key, TOR client, access banking services on-line, or when there is an interest to filter what you can read on the Internet. It should be noted that under particular circumstances, it is possible to attack HTTPS secured communication successfully. This paper proposes a steganography scheme that can be used to detect unauthorized modifications of HTTP communication.
  • Keywords
    Internet; banking; steganography; telecommunication security; transport protocols; HTTP communication; HTTPS secured communication; Internet; PGP key; TOR client; banking services; man-in-the-middle attack; steganography; Access protocols; Banking; Computer networks; Cryptographic protocols; Cryptography; Information filtering; Network servers; Steganography; Web and internet services; Web server; HTTP; HTTPS; attack; cryptography; detection; steganography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet and Web Applications and Services (ICIW), 2010 Fifth International Conference on
  • Conference_Location
    Barcelona
  • Print_ISBN
    978-1-4244-6728-0
  • Type

    conf

  • DOI
    10.1109/ICIW.2010.12
  • Filename
    5476817