МЕТОД РОЗШИФРОВКИ ТРАФІКУ TLS ДЛЯ ВИЯВЛЕННЯ ПРИХОВАНИХ ЗАГРОЗ
Анотація
DECRYPTING TLS TRAFFIC METHOD FOR HIDDEN THREATS DETECTION
The analysis of the basic methods of decrypting the TLS traffic was conducted on this work. The methods and technologies for detecting malicious activity in encrypted traffic used by leading companies are presented. Also developed, tested and offered a method of interception and decryption of traffic transmitted through TLS. The developed method was automated and can be used for remote listening to the network, which will allow decoding data transmitted in real-time mode.
Посилання
White paper. Cisco public. Encrypted Traffic Analytics. 2018 Cisco.
Hidden Threats in Encrypted Traffic: A Study of North America & EMEA. Independently conducted by Ponemon Institute LLC. 2016.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2018 Тамара Анатоліївна Радівілова, Максим Хаджем Тавалбех
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.