A comprehensive survey of vulnerability and information security in SDN

R Deb, S Roy - Computer Networks, 2022 - Elsevier
SDN changes the networking vision with an impressive thought of segregating the
networking control from the data management hardware and brings new functionalities such …

Openflow communications and tls security in software-defined networks

B Agborubere… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The adoption of Software-Defined Networking (SDN), a networking approach where data
traffic control and execution are made independent of each other, is an ongoing process that …

Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem

S Calzavara, R Focardi, M Nemec… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS aims at securing communication over the Web by providing a cryptographic
protection layer that ensures the confidentiality and integrity of communication and enables …

A formal treatment of accountable proxying over TLS

K Bhargavan, I Boureanu… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Much of Internet traffic nowadays passes through active proxies, whose role is to inspect,
filter, cache, or transform data exchanged between two endpoints. To perform their tasks …

TLS Malicious Encrypted Traffic Identification Research.

K Peng, Y Wenzhong… - Journal of Computer …, 2022 - search.ebscohost.com
With the advent of the 5G era and the increasing public awareness of the Internet, the public
has paid more and more attention to the protection of personal privacy. Due to malicious …

An automated tool for website security assessment: Demonstration on Swedish authorities' websites

M Valdaserides Olofsson, M Stengård - 2024 - diva-portal.org
The evolution of internet has affected society in many ways. Organizations and authorities
offer their services on their many corresponding websites. Consequently, secure …

[PDF][PDF] Student Number: 180240438

N Hitch - 2022 - royalholloway.ac.uk
This report is one of the required modules for the course MSc in Information Security at
Royal Holloway, University of London. This is a longitudinal study for the adoption of several …

Statistical attacks on cookie masking for RC4

KG Paterson, JCN Schuldt - Cryptography and Communications, 2018 - Springer
Levillain et al.(Asia CCS 2015) proposed two cookie masking methods, TLS Scramble and
MCookies, to counter a class of attacks on SSL/TLS in which the attacker is able to exploit its …

[PDF][PDF] HONEYNET AS A SERVICE DEPLOYMENT APPROACH IN ENABLING VIRTUAL CRIME SCENE INVESTIGATION

H HASHEMINEJAD - 2015 - psasir.upm.edu.my
UNIVERSITI PUTRA MALAYSIA HAMIDREZA HASHEMINEJAD FK 2015 29 HONEYNET AS A
SERVICE DEPLOYMENT APPROACH IN ENABLING VIRTUAL CRIME Page 1 UNIVERSITI …

Challenging RSA cryptosystem implementations

M Nemec - 2020 - dspace.unive.it
The aim of our research was to study security properties of real-world deployments of the
RSA cryptosystem. First we analyze RSA key generation methods in cryptographic libraries …