HTTP PROTOKOLI SARLAVHASIDA AXBOROT BERKITISH ALGORITMI

Authors

  • Obid Nizomovich Mavlonov Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti

Keywords:

HTTP, HTTPS, qatlam, yashirin soha, shifrlash, axborotni berkitish.

Abstract

Ushbu maqolada HTTP (HTTPS) protokolining yashirin kanallari va ularda axborot berkitish masalalari koʻrib chiqilgan. Axborotlarni yashirish maqsadida taklif etilgan algoritmda maxfiy ma’lumotlar HTTP so‘rov-paketining sarlavha maydonlariga joylashtiriladi hamda asimmetrik shifrlash algoritmlaridan foydalangan holda shifrlanadi. Shuningdek, uning xavfsizligi ushbu shifrlash algoritmlarining xavfsizligiga bogʻliqligi keltirilgan.

References

Tran C. M. et al. Cross-protocol unfairness between adaptive streaming clients over http/3 and http/2: A root-cause analysis //Electronics. – 2021. – Т. 10. – №. 15. – С. 1755.

Brylinski A. S., Bhattacharjya A. Overview of HTTP/2 //Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing. – 2017. – С. 1-6.

Ganivev, Abduhalil, Obid Mavlonov, and Baxtiyor Turdibekov. "Improving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation." 2021 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2021.

Ghaznavi M. et al. Content Delivery Network Security: A Survey //IEEE Communications Surveys & Tutorials. – 2021. – Т. 23. – №. 4. – С. 2166-2190.

Aliwarga H. K., Satriatama A. H., Pratama B. F. A. Performance comparison of fleet management system using IoT node device based on MQTT and HTTP protocol //AIP Conference Proceedings. – AIP Publishing LLC, 2020. – Т. 2217. – №. 1. – С. 020009.

Wolsing K. et al. A performance perspective on web optimized protocol stacks: TCP+ TLS+ HTTP/2 vs. QUIC //Proceedings of the Applied Networking Research Workshop. – 2019. – С. 1-7.

Akasiadis C., Pitsilis V., Spyropoulos C. D. A multi-protocol IoT platform based on open-source frameworks //Sensors. – 2019. – Т. 19. – №. 19. – С. 4217.

Anderson B. et al. Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption //Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. – 2019. – С. 267-278.

Dong, P., Qian, H., Lu, Z., Lan, S., A Network Covert Channel Based on Packet Classification, International Journal of Network Security, 2012, 14(2), 109–116

Gianvecchio, S., Wang, H., Wijesekera, D., Jajodia, S., Model-based covert timing channels: Automated modeling and evasion, in: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008, LNCS, vol. 5230, Springer, 2008, 211–230

Gianvecchio, S., Wang, H., An Entropy-Based Approach to Detecting Covert Timing Channels, IEEE Transactions on Dependable and Secure Computing, vol.8, issue 6, 2011, 785–797

Jankowski, B., Mazurczyk, W., Szczypiorski, K., PadSteg: Introducing Inter-Protocol Steganography, Telecommunication Systems, 2013, 52(2), 1101–1111

Luo, X., Chan, E., Chang, R., TCP Covert Timing Channels: Design and Detection, In proceedings of:

IEEE International Conference on Dependable Systems and Networks With FTCS and DCC, Anchorage, Alaska, June 24-27, 2008, 420 – 429

Mazurczyk, W., Smolarczyk, M., Szczypiorski, K., On Information Hiding in Retransmissions, Telecommunication Systems: Modelling, Analysis, Design and Management, vol. 52, issue 2, 1113-1121, 2013

Downloads

Published

2023-01-20

How to Cite

Mavlonov, O. N. (2023). HTTP PROTOKOLI SARLAVHASIDA AXBOROT BERKITISH ALGORITMI. RESEARCH AND EDUCATION, 2(1), 146–158. Retrieved from https://researchedu.org/index.php/re/article/view/1350