2016 2nd International Conference on Next Generation Computing Technologies (NGCT) 2016
DOI: 10.1109/ngct.2016.7877537
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive study on security attacks on SSL/TLS protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…However, they suffer from flexibility and manageability issues due to the use of Public Key Infrastructure (PKI) [17,18]. In addition, many security vulnerabilities were found in such protocols [19,20]. Thus, it is essential to find an alternative.…”
Section: Related Workmentioning
confidence: 99%
“…However, they suffer from flexibility and manageability issues due to the use of Public Key Infrastructure (PKI) [17,18]. In addition, many security vulnerabilities were found in such protocols [19,20]. Thus, it is essential to find an alternative.…”
Section: Related Workmentioning
confidence: 99%
“…The evolution of cipher suites from the simple adapted cipher suite is depicted in Fig. 3 [18]. For their hidden session key encryption, SSL and TLS used the RSA algorithm when they first began protecting the web browser and web server.…”
Section: Analysis Of Cipher Suitesmentioning
confidence: 99%
“…This creates a scenario where the port remains open until the connection times out, when another fabricated SYN request is received. This overwhelms the target system's resources and prevents legitimate users from establishing connections [117][118][119][120][121]. Although UDP does not need a handshake to establish a connection, which in itself creates a vulnerability for attacks that overwhelm the connections with large volumes of bogus traffic.…”
Section: Transport (Layer 4)mentioning
confidence: 99%