Verify-Pro: A Framework for Server Authentication using Communication Protocol Dialects

被引:2
|
作者
Gogineni, Kailash [1 ]
Mei, Yongsheng [1 ]
Venkataramani, Guru [1 ]
Lan, Tian [1 ]
机构
[1] George Washington Univ, Dept Elect & Comp Engn, Washington, DC 20052 USA
关键词
Program customization; Protocol dialects; Deep learning; Authentication;
D O I
10.1109/MILCOM55135.2022.10017649
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Customizing program binary and communication features is a commonly adopted strategy to counter network security threats like session hijacking, context confusion, and impersonation attacks. A potential attacker may have enough time to launch an attack targeting these vulnerabilities by rerouting the target request to a malicious server or hijacking the traffic. This paper presents a novel system Verify-Pro, a framework for server authentication using communication protocol dialects by customizing the communication features, enforcing continuous authentication, detecting the adversary, and preventing sensitive information leakage. Specifically, we leverage a machine learning approach (pre-trained neural network model) on both client and server machines to trigger a specific dialect that dynamically changes for each request (e.g., get filename in FTP). Then, a decision tree algorithm is developed to automatically detect the adversary and terminate the entire session if the message is from an adversary. We implement a prototype of VerifyPro and evaluate its practicality on standard communication protocol: FTP (File Transfer Protocol) and present a case study of the internet of things protocol MQTT (Message Queuing Telemetry Transport). Our experimental results show that by sending misleading information through the message packets from an attacker at the application layer, it is possible for the recipient to identify if the sender is genuine or a spoofed one, with a negligible overhead of < 1%.
引用
收藏
页数:8
相关论文
共 49 条
  • [21] An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
    Hwang, Min-Shiang
    Li, Hou-Wen
    Yang, Cheng-Ying
    International Journal of Network Security, 2024, 26 (04) : 713 - 718
  • [22] A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1953 - 1966
  • [23] An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design
    Maitra, Tanmoy
    Islam, S. K. Hafizul
    Amin, Ruhul
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4615 - 4638
  • [24] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
    Kumar, Ashish
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) : 14163 - 14189
  • [25] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
    Ashish Kumar
    Hari Om
    Multimedia Tools and Applications, 2021, 80 : 14163 - 14189
  • [26] A public key encryption authentication new protocol by using the third party for mobile communication
    Li, FW
    Chen, GH
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1064 - 1069
  • [27] A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC
    Qi, Mingping
    Chen, Jianhua
    Chen, Yitao
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 164 : 101 - 109
  • [28] An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    Li, Xiong
    Xiong, Yongping
    Ma, Jian
    Wang, Wendong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) : 763 - 769
  • [29] Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments
    Xu, Zhiqiang
    He, Debiao
    Huang, Xinyi
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 595 - 605
  • [30] Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using Drones
    Vangala, Anusha
    Agrawal, Saurabh
    Das, Ashok Kumar
    Pal, Shantanu
    Kumar, Neeraj
    Lorenz, Pascal
    Park, Youngho
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 10196 - 10210