Academic literature on the topic 'Secure Socket Tunneling Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Socket Tunneling Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure Socket Tunneling Protocol"

1

Slameto, Andika Agus, and Rahmat Hidayat. "Comparative Analysis of PPPOE and SSTP Performance in Microtic(Analisis Perbandingan Kinerja PPPOE dan SSTP Pada Mikrotik)." Jurnal KomtekInfo 6, no. 2 (2019): 107–16. http://dx.doi.org/10.35134/komtekinfo.v6i2.49.

Full text
Abstract:
Tunneling is the process of packaging data sent by other protocols in a network. Point to point over Ethernet (PPPOE) andSecure Socket Tunneling Protocol (SSTP) are protocols that function or are designed to carry out tunneling processes. Datasecurity in this case is a top priority, with the encapsulation and authentication process making tunnels one of the many waysto secure data in a network. Besides security, network performance is something that must be considered in providing goodservices. In the process of testing the performance of PPPOE and SSTP using the Quality of Service method, it can beconcluded that SSTP is better in the parameters of Througput, Delay, and Jitter while PPPOE is better in Packet Loss. In thesecurity testing phase, both protocols have encapsulated data packets sent over an http-based web.
APA, Harvard, Vancouver, ISO, and other styles
2

Lukman, Lukman, and Aiman Mukhlishah. "Analisis Perbandingan Kinerja Jaringan Secure Socket Tunneling Protocol (Sstp) Dan Layer Two Tunneling Protocol (L2tp) + Internet Protocol Security (Ipsec) Menggunakan Metode Quality Of Service (Qos)." Respati 15, no. 2 (2020): 16. http://dx.doi.org/10.35842/jtir.v15i2.344.

Full text
Abstract:
INTISARIKinerja jaringan yang buruk tentu akan berdampak buruk pada kerugian bagi sebuah perusahaan atau instansi, ketika kinerja jaringan yang digunakan oleh perushaan berubah menjadi lambat, pasti sangat berpengaruh terhadap kinerja perusahaan itu sendiri, terlebih jika sebuah perusahaan selalu bergantung pada internet untuk kelancaran bisnisnya. Semakin banyaknya perusahaan perusahaan yang membutuhkan kinerja jaringan yang cepat dan aman maka untuk mengatasi hal tersebut, ada beberapa metode yang bisa digunakan seperti banyaknya pilihan metode VPN (Virtual Private Network).Teknologi VPN adalah suatu komunikasi dalam jaringan sendiri yang terpisah dari jaringan umum. Private network sendiri dianggap lebih efisien karena kecepatan transfer data yang lebih besar dari pada kecepatan transfer data pada jaringan Internet, selain itu masalah keamanan dianggap lebih bagus karena hanya bergerak dalam lingkup terbatas saja. Secara umum, VPN adalah sebuah proses dimana jaringan umum (public network atau internet) diamankan kemudian difungsikan menjadi sebuah jaringan privat (private network). Sebuah VPN tidak didefinisikan oleh rangkaian khusus atau router, tetapi didefinisikan oleh mekanisme keamanan dan prosedur-prosedur yang hanya mengijinkan penggunanya yang ditunjuk akses ke VPN dan informasi yang mengalir melaluiya.Masalah yang dihadapi saat ini yaitu ketika performa jaringan yang lambat akan berpengaruh pada kinerja perusahaan, untuk berhubungan antar kantor menggunakan internet dan email untuk mengirim data dan berkomunikasi maka dibutuhkan jaringan privat untuk memudahkan mengakses file terhadap suatu tempat yang berbeda lokasi. Namun dalam Pemilihan VPN yang akan digunakan memungkinkan kurang tepatnya pemilihan metode yang digunakan dalam mengelola jaringan intranet untuk perusahaannya.Dari uraian diatas maka penulis melakukan analisis perbandingan sebuah teknik tunneling dengan menggunakan SSTP dan L2TP+IPSec. SSTP dan L2TP+IPSec merupakan protokol jaringan yang dapat melindungi jaringan dari ancaman luar seperti konflik IP, MAC dan DHCP server jahat, serta membuat performa jaringan lebih baik, dengan metode penggunaan jalur tersendiri yang di lalui atau dilewati. Dari kedua metode tersebut penulis melakukan perbandingan performa jaringan ketika di terapkan metode SSTP dan L2TP+IPSec sehingga mengetahui performa jaringan mana yang lebih bagus dan cocok digunakan sesuai dengan kebutuhan pengguna.Hasil dari penelitian ini diharapkan dapat membantu siapapun untuk menentukan metode tunneling VPN yang akan digunakan kelak dalam suatu jaringan. Sedangkan dari hasil penelitian bisa diambil kesimpulan bahwa L2TP+IPSec lebih baik dibanding SSTP, dinilai dari parameter QOS yang sudah diuji dan dibandingkan.Kata kunci: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service ABSTRACTPoor network performance will certainly have a bad impact on losses for a company or agency, when the network performance used by the company turns out to be slow, it must be very influential on the performance of the company itself, especially if a company always relies on the internet for the smooth running of its business. More and more companies need fast and secure network performance. To overcome this, there are several methods that can be used such as the choice of VPN (Virtual Private Network) methods.VPN technology is communication within one's own network that is separate from public networks. Private network itself is considered more efficient because the data transfer speed is greater than the data transfer speed on the Internet network, besides that security issues are considered better because it only moves in a limited scope. In general, VPN is a process in which a public network (public network or internet) is secured and then functioned as a private network. A VPN is not defined by a specific circuit or router, but is defined by security mechanisms and procedures that only allow their designated users access to the VPN and the information that flows through it.The problem currently faced is when slow network performance will affect company performance, to connect between offices using the internet and email to send data and communicate, then a private network is needed to facilitate accessing files to a different location. However, the selection of VPNs that will be used allows less precise selection of methods used in managing intranet networks for the company.From the description above, the authors conducted a comparative analysis of a tunneling technique using SSTP and L2TP + IPSec. SSTP and L2TP + IPSec are network protocols that can protect networks from external threats such as IP, MAC and DHCP server conflicts, and make network performance better, by using separate paths that are traversed or traversed. From these two methods, the writer makes a comparison of network performance when applied SSTP and L2TP + IPSec methods so that it knows which network performance is better and is suitable for user needs.The results of this study are expected to help anyone determine the VPN tunneling method that will be used later in a network. While the results of the study can be concluded that L2TP + IPSec is better than SSTP, judged by the QOS parameters that have been tested and compared.Keywords: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service
APA, Harvard, Vancouver, ISO, and other styles
3

Ruslianto, Ikhwan. "Perancangan dan Implementasi Virtual Private Network (VPN) menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura." Computer Engineering, Science and System Journal 4, no. 1 (2019): 74. http://dx.doi.org/10.24114/cess.v4i1.11792.

Full text
Abstract:
Internet sudah menjadi bagian yang tidak terpisahkan dari aktivitas manusia sehari-hari. Dengan internet segala informasi bisa didapatkan dalam waktu yang cepat, dari berbagai penjuru dunia dapat saling berkomunikasi dan bertukar informasi. Akan tetapi dengan adanya internet, keterbukaan informasi menjadi hal yang biasa, walaupun terkadang ada informasi yang masih bersifat rahasia (confidentiality). Informasi dapat berupa apa saja, tidak terkecuali informasi dan data yang berkaitan dengan institusi pendidikan, Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Tanjungpura salah satunya. Di Fakultas MIPA sendiri ada beberapa informasi-informasi informasi yang hanya boleh diakses oleh kalangan tertentu saja. Misalnya ada beberapa aplikasi yang hanya dapat dibuka di lingkungan FMIPA saja maka dibuatlah mekanisme Virtual Private Network menggunakan protokol SSTP (Secure Socket Tunneling Protocol) agar Server dan aplikasi yang ada di lingkungan FMIPA dapat diakses menggunakan internet diluar lingkungan FMIPA. Konfigurasi SSTP dapat dilakukan menggunakan perangkat router mikrotik yang dihubungkan menggunakan perantara Virtual Private Server (VPS) yang ada di internet, kemudian diintegrasikan pada router mikrotik, sehingga kedua kondisi tersebut dapat saling berinteraksi seolah-olah pengguna berada dilingkungan FMIPA Untan
APA, Harvard, Vancouver, ISO, and other styles
4

Nur, Jabal, La Raufun La Raufun, and Muhtita Afifa. "SIMULASI VIRTUAL PRIVATE NETWORK (VPN) MENGGUNAKAN SECURE SOCKET TUNNELING PROTOCOL (SSTP) PADA JARINGAN KAMPUS UNIDAYAN BAUBAU." JURNAL INFORMATIKA 10, no. 1 (2021): 85. http://dx.doi.org/10.55340/jiu.v10i1.451.

Full text
Abstract:
<p><em>Pertukaran informasi menjadi salah satu kebutuhan yang sangat mendukung kegiatan dalam Universitas. Tugas akhir ini bertujuan untuk mengatur dan mensimulasikan VPN yang menggunakan SSTP pada mikrotik agar dapat menghubungkan kampus palagimata dan kampus istana ilmiah unidayan Baubau. Penelitian ini menggunakan metode ping test dengan menggunakan command prompt dan new terminal. Hasil penelitian menunjukan simulasi sistem telah berhasil dibuat dengan menggunakan VPN SSTP. Dapat disimpulkan bahwa simulasi VPN SSTP ini dapat menghubungkan kampus palagimata dan kampus istana ilmiah unidayan Baubau.</em></p><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
5

Wa, Ode Zamalia, Fid Aksara L.M., and Yamin Muh. "ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK." semanTIK 4, no. 2 (2018): 29–36. https://doi.org/10.5281/zenodo.1444898.

Full text
Abstract:
<strong><em>Abstract</em></strong><em>Tunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to be applicable to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service</em> (QoS)<em> parameters consisting of Packet Loss, Delay, and Throughput. Tests performed on four clients which connected to the access point. Testing is done with two kinds of networks, the first one in which all client access web for download purpose and the second one in which all client access web for streaming video. The security testing result between PPTP tunnels, L2TP, SSTP, and IPSec shows that security level built by IPsec tunnels better than the L2TP, SSTP, and PPTP tunnels. Moreover, based on the results of testing on performance, security and test findings obtained that IPsec VPN tunnel better than tunnel VPN PPTP L2TP and SSTP.</em>
APA, Harvard, Vancouver, ISO, and other styles
6

Hermanto, Dedy, and M. Syaiful Anam. "Implementasi Sistem Keamanan Hotspot Jaringan Menggunakan Metode OpenSSL (Secure Socket Layer)." Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer dan Teknologi Informasi 6, no. 1 (2020): 57. http://dx.doi.org/10.24014/coreit.v6i1.8394.

Full text
Abstract:
Keamanan jaringan wireless pada perangkat access point yang sering digunakan adalah metode WEP/WPA/WPA2. Hampir semua pengguna jaringan wireless rata-rata mengimplemetasikan perangkat access pointnya dengan menggunakan metode tersebut. Metode tersebut dikenal baik dalam hal kemampuan pengamanan security jaringan wireless tetapi metode WEP/WPA/ WPA2 masih bisa ditembus oleh aplikasi hacking dengan metode brute-force attack dan dictionary. Proses penelitian ini menggunakan metode action research, yang bertujuan untuk mengembangkan metode kerja yang paling efisien. Dimana akan dilakukan diagnosa, rencana tindakan, tindakan, evaluasi, dan pembelajaran. Salah satu solusi keamanan wireless hotspot adalah dengan menerapkan Metode SSL (Secure Socket Layer). Metode SSL (Secure Socket Layer) telah banyak digunakan untuk pengamanan website yang membutuhkan pengamanan tingkat tinggi seperti website perbankan, hosting, jual beli online dan sebagainya yang biasanya pada website tersebut menggunakan protocol HTTPS ( Hyper Text Transfer Protocol Secure). Proses pengujian yaitu sniffing, untuk membobol user dan password login dan konsep duplikasi mac address atau yang dikenal dengan nama ARP spoofing dalam pengujian keamanan jaringan wireless dengan metode Secure Socket Layer (SSL). Hasil yang diperoleh bahwa sistem ini dapat mengamankan jaringan hotspot internet dengan lebih aman dan tidak mudah untuk di tembus
APA, Harvard, Vancouver, ISO, and other styles
7

Charke, A. Ben, M. Chabi, and M. Fakir. "Contribution to the Security of the Information System." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 1 (2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.

Full text
Abstract:
Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS "SNORT" software.
APA, Harvard, Vancouver, ISO, and other styles
8

Khalil, Knaj Nouma. "IMPACT OF TUNNELING ON NETWORK CAPACITY." SYNCHROINFO JOURNAL 8, no. 4 (2022): 9–13. http://dx.doi.org/10.36724/2664-066x-2022-8-4-9-13.

Full text
Abstract:
For many companies, setting up a VPN for secure, encrypted communication is a cost-effective alternative to purchasing, operating, and managing a separate physical network. Many institutions, corporations, government agencies and nonprofit organizations want to have their own private IP network for secure and reliable connectivity between offices across multiple geographies. A virtual private network (VPN) is a secure, encrypted connection over a public public network. Creating a separate network requires the purchase of equipment, its installation and maintenance. A VPN-based solution using the public Internet is becoming a cost-effective solution for many corporations. As a research task, the authors define an assessment of the impact of the tunneling technology used to solve problems arising from the lack of network support from existing data transfer protocols. The possibility of using the IPSec protocol and MPLS technology to implement tunneling is considered and compared. The results of the comparison and evaluation of the impact of the choice of protocol on the required bandwidth are presented.
APA, Harvard, Vancouver, ISO, and other styles
9

Monika and Shuchita Upadhyaya. "Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks." Procedia Computer Science 70 (2015): 808–13. http://dx.doi.org/10.1016/j.procs.2015.10.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ohe, K., S. Kaihara, and T. Kiuchi. "Using a WWW-based Mail User Agent for Secure Electronic Mail Service for Health Care Users." Methods of Information in Medicine 37, no. 03 (1998): 247–53. http://dx.doi.org/10.1055/s-0038-1634539.

Full text
Abstract:
AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secure Socket Tunneling Protocol"

1

"Integrating Entanglement Swapping into Secure Socket Layer — Handshake Protocol." In International Conference on Future Computer and Communication, 3rd (ICFCC 2011). ASME Press, 2011. http://dx.doi.org/10.1115/1.859711.paper1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Applied Cryptography in E-mail Services and Web Services." In Applied Cryptography for Cyber Security and Defense. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch005.

Full text
Abstract:
E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a channel of accessing interlinked hypermeida via the World Wide Web. As these two methods of network communications turn into the most popular services over the Internet, applied cryptography and secure authentication protocols become indispensable in securing confidential data over public networks. In this chapter, we first review a number of cryptographic ciphers widely used in secure communication protocols. We then discuss and compare the popular trust system Web of Trust, the certificate standard X.509, and the standard for public key systems Public Key Infrastructure (PKI). Two secure e-mail standards, OpenPGP and S/MIME, are examined and compared. The de facto standard cryptographic protocol for e-commerce, Secure Socket Layer (SSL) / Transport Layer Security (TLS), and XML Security Standards for secure web services are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Rahnama, Behnam, Arif Sari, and Marwan Yassin Ghafour. "Countering RSA Vulnerabilities and Its Replacement by ECC." In Network Security Attacks and Countermeasures. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch012.

Full text
Abstract:
Security is utilized to keep the information safe. Online resources, e-commerce, internet banking and a lot of similar services are protected by use of well-known protocols such as Secure Socket Layer (SSL). This protocol makes use of the RSA key exchange protocol for authentication. New innovations and boost ups in the computational power of supercomputers today makes it quite easier than before to break through RSA and consequently decrypt the payload transferred over SSL. In this research demonstrates the use of SSL; how to utilize it in the best shape? We also discuss reasons of why we need to improve its strength. The proposed solution is to replace the RSA key exchange mechanism utilized in SSL with Elliptic Curve Cryptography (ECC).
APA, Harvard, Vancouver, ISO, and other styles
4

Mogollon, Manuel. "TLS, SSL, and SET." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch012.

Full text
Abstract:
In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted using transport layer security (TLS) or secure socket layer (SSL) protocols. When a purchase is made online using a credit card, does the customer’s bank need to know what was purchased? Not really. Does the seller need to know the customer’s credit card number? Actually, the answer is no. The responses to these questions were the main premises of the secure electronic transaction (SET). In the late 1990’s, SET was approved as the credit card standard, but it failed to be accepted because of its cost and the problems regarding distribution of end-user certificates. However, SET is explained in this chapter as an ideal protocol, from the point of view of certificates, digital signatures, and cryptography for securing credit card transactions over the Internet.
APA, Harvard, Vancouver, ISO, and other styles
5

Adibi, Sasan, Gordon B. Agnew, and Tom Tofigh. "End-to-End (E2E) Security Approach in WiMAX." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch047.

Full text
Abstract:
An overview of the technical and business aspects is given for the corporate deployment of services over worldwide interoperability for microwave access (WiMAX). WiMAX is considered to be a strong candidate for the next generation of broadband wireless access; therefore its security is critical. This chapter provides an overview of the inherent and complementary benefits of broadband deployment over a long haul wireless pipe, such as WiMAX. In addition, we explore end-to-end (E2E) security structures necessary to launch secure business and consumer class services. The main focus of this chapter is to look for a best security practice to achieve E2E security in both vertical and horizontal markets. The E2E security practices will ensure complete coverage of the entire link from the client (user) to the server. This is also applicable to wireless virtual private network (VPN) applications where the tunneling mechanism between the client and the server ensures complete privacy and security for all users. The same idea for E2E security is applied to client-server-based multimedia applications, such as in Internet protocol (IP) multimedia subsystem (IMS) and voice over IP (VoIP) where secure client/server communication is required. In general, we believe that WiMAX provides the opportunity for a new class of high data rate symmetric services. Such services will require E2E security schemes to ensure risk-free high data-rate uploads and downloads of multimedia applications. WiMAX provides the capability for embedded security functions through the 802.16 security architecture standards. IEEE 802.16 is further subcategorized as 802.16d (fixed-WiMAX) and 802.16e (mobile-WiMAX). Due to the mobility and roaming capabilities in 802.16e and the fact that the medium of signal transmission is accessible to everyone, there are a few extra security considerations applied to 802.16e. These extra features include: privacy key management version 2 (PKMv2), PKM-extensible authentication protocol (EAP) authentication method, advanced encryption standard (AES) encryption wrapping, and so forth. The common security features of 802.16d and 802.16e are discussed in this chapter, as well as the highlights of the security comparisons between other broadband access, third-generation (3G) technologies, and WiMAX.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure Socket Tunneling Protocol"

1

Bhiogade, Mittal. "Secure Socket Layer." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jha, Ritesh Kumar, and Farida Khurshid. "Performance analysis of enhanced secure socket layer protocol." In 2014 International Conference on Communication and Network Technologies (ICCNT). IEEE, 2014. http://dx.doi.org/10.1109/cnt.2014.7062777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Duddu, Siromani, Arigela Rishita sai, Ch L. S. Sowjanya, G. Ramakoteswara Rao, and KarthikSainadh Siddabattula. "Secure Socket Layer Stripping Attack Using Address Resolution Protocol Spoofing." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2020. http://dx.doi.org/10.1109/iciccs48265.2020.9120993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Otrok, H., R. Haraty, and A. N. El-Kassar. "Improving the Secure Socket Layer Protocol by modifying its Authentication function." In 2006 World Automation Congress. IEEE, 2006. http://dx.doi.org/10.1109/wac.2006.375755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Habibi, Jafar Alim, Rendy Munadi, and Leanna Vidya Yovita. "Analysis secure socket layer protocol with heartbleed bug and distributed denial-of-service." In 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). IEEE, 2016. http://dx.doi.org/10.1109/iccerec.2016.7814960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dunbar, DeJean. "Survey of Secure Network Protocols: United States Related Domains." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121207.

Full text
Abstract:
Over time, the HTTP Protocol has undergone significant evolution. HTTP was the internet's foundation for data communication. When network security threats became prevalent, HTTPS became a widely accepted technology for assisting in a domain’s defense. HTTPS supported two security protocols: secure socket layer (SSL) and transport layer security (TLS). Additionally, the HTTP Strict Transport Security (HSTS) protocol was included to strengthen the HTTPS protocol. Numerous cyber-attacks occurred in the United States, and many of these attacks could have been avoided simply by implementing domains with the most up-to-date HTTP security mechanisms. This study seeks to accomplish two objectives: 1. Determine the degree to which US-related domains are configured optimally for HTTP security protocol setup; 2. Create a generic scoring system for a domain's network security based on the following factors: SSL version, TLS version, and presence of HSTS to easily determine where a domain stands. We found through our analysis and scoring system incorporation that US-related domains showed a positive trend for secure network protocol setup, but there is still room for improvement. In order to safeguard unwanted cyber-attacks, current HTTP domains need to be extensively investigated to identify if they possess security-related components. Due to the infrequent occurrence of HSTS in the evaluated domains, the computer science community necessitates further HSTS education.
APA, Harvard, Vancouver, ISO, and other styles
7

Murphree, Jay, Roark Weil, and John R. Wootton. "Emerging Trends in Intra Vehicle Networks for Data, Control and Power Distribution." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3142.

Full text
Abstract:
&lt;title&gt;Abstract&lt;/title&gt; &lt;p&gt;Current and future military vehicles will be expected to not only last longer than their predecessors, but also operate with a flexible mission package. These vehicles must be architected for lifecycle multiple upgrades of electronics and general product improvements.&lt;/p&gt; &lt;p&gt;The ability to be upgraded and reconfigured for flexible mission profiles compels the vehicle’s architecture be centered around a “data bus” network backbone that facilitates “universal plug and play” of electronic payloads. The vehicle’s over all data stream will consist of at a minimum of voice, video, control and diagnostics. To maintain flexibility as well as to be cost effective in support of the “plug and play concept” for new and upgraded electronic payloads it is a fundamental requirement that every type of current and foreseeable data streams be able to coexist on one single network backbone. Only this architecture will guarantee the most flexible, and scalable reconfiguring for future expansions or mission equipment changes.&lt;/p&gt; &lt;p&gt;Military vehicles use higher and higher resolution multiple wavelength sensors for target acquisition, a proliferation of cameras for both day and night driving and (360°) situation awareness. The need/demand for any selection of available video at various crew stations with less and less latency is on the rise.&lt;/p&gt; &lt;p&gt;The growing trend within the military is to follow the commercial world of delivering both video and voice over the digital IP network. Within a military vehicle, the trend is consistent with the adoption of digital voice IP and video IP networks. The issues of capacity and bandwidth are ever present, coupled to the need for faster speeds, less latency, secure, self diagnosing networks, self reconfiguring networks and scalability.&lt;/p&gt; &lt;p&gt;The need for flexibility and growth for vehicle controls and health management (which today is supported by the vehicle’s 1939 can bus) requires a vehicle architecture which allows tunneling that the control signal data has a guaranteed delivery, and further the architecture can be expanded to accommodate new controls, and low band width data such as vehicle health management.&lt;/p&gt; &lt;p&gt;A power distribution network also needs to coexist with the control and data networks. The authors will discuss the emerging trends in all three areas, together with the need to operate asynchronously yet allow tunneling of the control and data networks. We will discuss the trends in topologies for all three networks, and how to ensure that they are scalable, and fault tolerant, self diagnostic and self reconfigurable, together with a fault tolerant communication protocol. We will also discuss the work primarily being developed at DRS TEM and DRS SSI in regards to these networks.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure Socket Tunneling Protocol"

1

Cam-Winget, N., D. McGrew, J. Salowey, and H. Zhou. The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cam-Winget, N., D. McGrew, J. Salowey, and H. Zhou. Dynamic Provisioning Using Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cam-Winget, N., and H. Zhou. Basic Password Exchange within the Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography