Mostrar el registro sencillo del ítem
Analysis of WEB Browsers of HSTS Security Under the MITM Management Environment
dc.contributor.author | Bareño-Gutiérrez, Raúl | |
dc.contributor.author | López Sevillano, Alexandra María | |
dc.contributor.author | Díaz Piraquive, Flor Nancy | |
dc.contributor.author | González-Crespo, Rubén | |
dc.date | 2021 | |
dc.date.accessioned | 2022-03-18T09:13:00Z | |
dc.date.available | 2022-03-18T09:13:00Z | |
dc.identifier.isbn | 9783030816346 | |
dc.identifier.issn | 1865-0929 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/12675 | |
dc.description.abstract | The transactional websites and services on the cloud, have actually become the most used browsers, thanks to their portability and ease of use, with a significant increase in the development of cloud solutions, implementing digital contexts under the 4.0 web, which generated an increase of possibilities for transactions of different types. However, every time more security issues arise. Due to this problem, the computer security is a rising trend, generating new possibilities to mitigate vulnerabilities when handling the information in a transactional web site; an analysis is made of performance, weaknesses and strengths of the HSTS standard, as a security complement of the SSL/TLS protocol. Different tests scenarios are verified under a man attack in the MITM environment, to intercept or capture the traffic sent and received during web transactions. That is how we identify if the standard can prevent that intrusion, which is of vital importance for the different transactional environments actually used, such as bank entities or online purchases; vulnerabilities of the standard are verified upon making the first request to a website, which strengthens and secures transactions done from the beginning of the transaction to its ending, in an encrypted way. Browsers analyzed - Mozilla Firefox, Google Chrome and internet Explorer, under controlled corporate and personal environments; The security importance of the browser is outlined, Google Chrome being the best one in performance under an internet hacking. The other browsers present some shortcomings during the first interconnection request, during some milliseconds under the point to point model, for the initial phase of information interchange | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Springer Science and Business Media Deutschland GmbH | es_ES |
dc.relation.ispartofseries | ;vol. 1438 | |
dc.relation.uri | https://link.springer.com/chapter/10.1007/978-3-030-81635-3_27 | es_ES |
dc.rights | restrictedAccess | es_ES |
dc.subject | A hacker in the MITM environment | es_ES |
dc.subject | HSTS complement | es_ES |
dc.subject | security | es_ES |
dc.subject | WEB browsers | es_ES |
dc.subject | Scopus(2) | es_ES |
dc.title | Analysis of WEB Browsers of HSTS Security Under the MITM Management Environment | es_ES |
dc.type | conferenceObject | es_ES |
reunir.tag | ~ARI | es_ES |
dc.identifier.doi | https://doi.org/10.1007/978-3-030-81635-3_27 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |