skip to main content
research-article

SHS-HTTPS enforcer: enforcing HTTPS and preventing MITM attacks

Authors Info & Claims
Published:11 November 2013Publication History
Skip Abstract Section

Abstract

Web servers provide immunity against Man In The Middle (MITM) attacks and eavesdropping by using HTTP Strict Transport Security (HSTS) to force user agents to communicate only over HTTPS connections. However, the initial connection request from a user is made over an insecure HTTP connection. This issue was addressed by user agents; Google Chrome and Firefox, implicitly, by including a static list of URLs to be accessed only over secure HTTPS connections. Since, these user agents maintain their lists independently, the URLs used by one user agent are invisible to another. A user is prone to MITM attacks, especially in public hotspot environments, when accessing a URL present in the list of secure URLs of one browser but not in another, since the initial handshake from that user agent is insecure. Attacks can be initiated by modifying the outgoing HTTP packets and also the HTTPS response packets from the webserver. This motivated us to propose a solution independent of user agents, by merging the static URL lists of different user agents and enforcing HTTPS for all those URLs. In this paper, we propose a solution, SHSHTTPS Enforcer that introduces a local daemon to enforce URL redirection before the request flows out of the client for the URLs in a list compiled from multiple sources. The proposed solution has been demonstrated through a prototype implementation of the Squid Proxy server as our local daemon. The experiment was conducted by providing a URL, which was not present in one browser's list but was present in another browser's list. It was evident that SHS-HTTPS Enforcer enforced HTTPS successfully and MITM attacks were prevented.

References

  1. R. Fielding, J. Gettys, J. Mogul, Henrik Frystyk, L. Masinter, P. Leach, T. Berners-Lee, "RFC 2616: Hypertext Transfer Protocol - HTTP/1.1", IETF, RFC 2616, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Liguo, Y., and A. Mishra (2010) Risk Analysis of Global Software Development and Proposed Solutions. Automatika, 51(1), 89--98.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ardimento, P., Cimitile, M., Visaggio, G. (2013): Distributed Software Development with Knowledge Experience Packages, OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 263--273.Google ScholarGoogle ScholarCross RefCross Ref
  4. Criado, J., Iribarne, L., Padilla, N. (2013): Resolving Platform Specific Models at runtime using an MDE-based Trading approach. OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 274--283.Google ScholarGoogle ScholarCross RefCross Ref
  5. Mishra, A., and Mishra, D. (2013): Software Architecture in Distributed Software Development: A Review, OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 284--291.Google ScholarGoogle ScholarCross RefCross Ref
  6. Raj, A, Barrett, S., Clarke, S. (2013): Run-time Root Cause Analysis in Adaptive Distributed Systems, OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 292--301.Google ScholarGoogle ScholarCross RefCross Ref
  7. Mishra, D., Mishra, A., Palacios, R.C. and Casado-Lumbreras, C. (2013): Global Software Development and Quality Management: A Systematic Review, OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 302--311.Google ScholarGoogle ScholarCross RefCross Ref
  8. Kääriäinen, J., Teppola, S. and Välimäki, A. (2013): Building a Concept Solution for Upgrade Planning in the Automation Industry, OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 312--321.Google ScholarGoogle Scholar
  9. Decker, H., and Muñoz-Escoí, F.D. (2013): Inconsistency-tolerant Business Rules in Distributed Information Systems. OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 322--331.Google ScholarGoogle ScholarCross RefCross Ref
  10. Taweel, A., Garcia, E. Miles, S., Luck, M (2013): Agent-Oriented Software Engineering (AOSE) of Distributed eHealth Systems, OTM 2013 Workshops, Graz, Austria, September 9-13, 2013, Y.T. Demey, and H. Panetto (Eds.), LNCS 8186, 332--341.Google ScholarGoogle Scholar

Index Terms

  1. SHS-HTTPS enforcer: enforcing HTTPS and preventing MITM attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader