Title :
Attacks vs. Countermeasures of SSL Protected Trust Model
Author :
Qi, Fang ; Tang, Zhe ; Wang, Guojun
Author_Institution :
Sch. of Inf. Sci. & Eng., Central South Univ., Changsha
Abstract :
This paper analyzes the problems within current anti-spoofing mechanisms and proposes a new SSL protected trust model. Then, this paper describes the attacks on SSL protected trust model. This paper also proposes the new automatic detecting security indicator (ADSI) scheme to defend against spoofing attacks on SSL protected Web servers. This paper describes the ADSI-based trust model. In a secure transaction, ADSI may randomly generate a picture and embed it into the current Web browser. This can be triggered by any security relevant events occurred on the browser, and then performs automatic checking on current active security status. When a mismatch of embedded images is detected, an alarm goes off to alert the users. Since an adversary is hard to replace or mimic the randomly generated picture, the Web-spoofing attack can not be mounted easily. In comparison with existing proposals, the proposed scheme has the following advantages: (1) weak security assumption and very low burden on the customer by automating the process of detection and recognition of the Web-spoofing for SSL-enabled communications, (2) little intrusive on the browser, and (3) easy implementation in trusted PC at Internet Cafe requiring neither logo certification authority, nor the scheme of personalization.
Keywords :
Internet; cryptographic protocols; file servers; telecommunication security; transport protocols; ADSI-based trust model; SSL protected Web server trust model; Web browser; Web spoofing attack; antispoofing mechanism; automatic detecting security indicator scheme; embedded image mismatch detection; logo certification authority; secure transaction; Displays; Graphical user interfaces; HTML; Image databases; Information science; Information security; Internet; Protection; Sockets; Web server; Automatic detection; Secure Socket Layer (SSL); Web spoofing; security indicator; trust model;
Conference_Titel :
Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for
Conference_Location :
Hunan
Print_ISBN :
978-0-7695-3398-8
Electronic_ISBN :
978-0-7695-3398-8
DOI :
10.1109/ICYCS.2008.433