Passive Aggressive: Network Attacks via Passive Analysis

Gardado en:
Detalles Bibliográficos
Publicado en:ProQuest Dissertations and Theses (2025)
Autor Principal: Sullivan, George Arnold
Publicado:
ProQuest Dissertations & Theses
Materias:
Acceso en liña:Citation/Abstract
Full Text - PDF
Etiquetas: Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!

MARC

LEADER 00000nab a2200000uu 4500
001 3285845885
003 UK-CbPIL
020 |a 9798270244521 
035 |a 3285845885 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Sullivan, George Arnold 
245 1 |a Passive Aggressive: Network Attacks via Passive Analysis 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a In theory the security of Internet communication depends on a variety of cryptographic protocols including ones for symmetric and asymmetric encryption, key exchange, signing messages, and generating random numbers. The security of these cryptographic protocols is based on underlying mathematical problems that are thought to be hard. Ideally, the protocols cannot be broken without attacking the underlying hard problems. However, in practice security depends on these protocols being correctly and securely implemented to keep them from leaking valuable information to an active, or even passive, attacker. While the security of implementations can be tested by a variety of means, including using code analysis and formal verification to improve source code, we focus on how existing security on the Internet can be probed by beginning with passive collection and analysis of real network traffic. We show that by passively looking at cryptographic data from real world connections, and following up with more active approaches when needed, one can expose problems with random number generation, discover incorrect and unusual cryptographic choices and implementations, and even recover private keys. In addition, for users attempting to evade censorship security can rest in hiding their traffic among more innocuous traffic. We show that a passive observer, using deep learning and host-based analysis, can identify circumventing traffic.  
653 |a Computer science 
653 |a Computer engineering 
653 |a Web studies 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3285845885/abstract/embedded/H09TXR3UUZB2ISDL?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3285845885/fulltextPDF/embedded/H09TXR3UUZB2ISDL?source=fedsrch