Next Article in Journal
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Journal
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(4), 38; https://doi.org/10.3390/cryptography2040038

Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity

1
Melbourne Polytechnic, Preston 3181, Australia
2
School of Information Technology, Deakin University, Burwood 3125, Australia
*
Author to whom correspondence should be addressed.
Received: 9 November 2018 / Revised: 2 December 2018 / Accepted: 4 December 2018 / Published: 5 December 2018
Full-Text   |   PDF [2924 KB, uploaded 12 December 2018]   |  
  |   Review Reports

Abstract

Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability—referred to as the CIA triad. While confidentiality and integrity can be achieved using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates, these depend on the correct authentication of servers, which could be compromised due to man-in-the-middle (MITM) attacks. Many existing solutions have practical limitations due to their operational complexity, deployment costs, as well as adversaries. We propose a novel scheme to detect MITM attacks with minimal intervention and workload to the network and systems. Our proposed model applies a novel inferencing scheme for detecting true anomalies in transmission time at a trusted time server (TTS) using time-based verification of sent and received messages. The key contribution of this paper is the ability to automatically detect MITM attacks with trusted verification of the transmission time using a learning-based inferencing algorithm. When used in conjunction with existing systems, such as intrusion detection systems (IDS), which require comprehensive configuration and network resource costs, it can provide a robust solution that addresses these practical limitations while saving costs by providing assurance. View Full-Text
Keywords: trusted time server (TTS); man-in-the-middle (MITM); Secure Socket Layer (SSL); Transport Layer Security (TLS); Secure Sockets Layer (SSL) time-based verification; inferencing schemes; cybersecurity; digital certificate; digital signature; inference algorithm trusted time server (TTS); man-in-the-middle (MITM); Secure Socket Layer (SSL); Transport Layer Security (TLS); Secure Sockets Layer (SSL) time-based verification; inferencing schemes; cybersecurity; digital certificate; digital signature; inference algorithm
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Kang, J.J.; Fahd, K.; Venkatraman, S. Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity. Cryptography 2018, 2, 38.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top