2022
DOI: 10.20535/tacs.2664-29132021.1.251299
|View full text |Cite
|
Sign up to set email alerts
|

Methods of counteraction of bypassing two-factor authentication using reverse proxy

Abstract: The existing solutions for counteracting and preventing the interception of data and tokens of two-factor authentication are considered. Features that may indicate the presence of a silent reverse proxy server are chosen. It is proposed to analyze the information about additional time anomalies, which are usually created by the proxy server. The advantage of this approach is that the time characteristics information is generated on the client-side, and the malicious proxy server cannot modify it. Machine learn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…An attacker, by intercepting the 2nd authentication factor, can gain access to the victim's resources, using a reverse proxy server, in this way -obtain complete information about the person posted on the resource [9]. Such attacks can be successfully carried out, for example, for Twitter, and for some mail providers.…”
mentioning
confidence: 99%
“…An attacker, by intercepting the 2nd authentication factor, can gain access to the victim's resources, using a reverse proxy server, in this way -obtain complete information about the person posted on the resource [9]. Such attacks can be successfully carried out, for example, for Twitter, and for some mail providers.…”
mentioning
confidence: 99%