2022
DOI: 10.21203/rs.3.rs-1676730/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study

Abstract: Built on top of UDP, the recently standardized QUIC protocol primarily aims to gradually replace the TCP plus TLS plus HTTP/2 model. For instance, HTTP/3 is designed to exploit QUIC’s features, including reduced connection establishment time, multiplexing without head of line blocking, always-encrypted end-to-end security, and others. This work serves two key objectives. Initially, it offers the first to our knowledge full-fledged review on QUIC security as seen through the lens of the relevant literature so f… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
3

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 33 publications
0
7
0
3
Order By: Relevance
“…This may seem unusual, given that this work does concentrate on the detection of application layer attacks. The basic reason behind this choice is that, typically, the application features are encrypted (and thus not available) due to, say, a TLS tunnel [ 30 ] or other mechanisms [ 31 ], including encrypted DNS [ 32 ]. Additionally, in certain cases, e.g., SSH, the traffic cannot be decrypted.…”
Section: Feature Selection and Data Preprocessingmentioning
confidence: 99%
“…This may seem unusual, given that this work does concentrate on the detection of application layer attacks. The basic reason behind this choice is that, typically, the application features are encrypted (and thus not available) due to, say, a TLS tunnel [ 30 ] or other mechanisms [ 31 ], including encrypted DNS [ 32 ]. Additionally, in certain cases, e.g., SSH, the traffic cannot be decrypted.…”
Section: Feature Selection and Data Preprocessingmentioning
confidence: 99%
“…For the hands-on evaluation, we reused the contemporary testbed given in § 5.1 of [46]. Precisely, this testbed is composed of the currently six most popular QUIC-and HTTP/3-enabled server implementations, namely OpenLiteSpeed, Caddy, NGINX, H2O, IIS, and Cloudflare.…”
Section: Hands On Evaluationmentioning
confidence: 99%
“…As already pointed out, in the context of this work, and in view of the results presented in Section 3 and in § 5.2 of [46], we create the first to our knowledge dataset considering attacks on HTTP/2, HTTP/3, and QUIC. A preliminary evaluation of the dataset by means of legacy Machine Learning methods is also offered.…”
Section: Datasetmentioning
confidence: 99%
See 2 more Smart Citations