HTTP PROTOKOLI SARLAVHASIDA AXBOROT BERKITISH ALGORITMI
Keywords:
HTTP, HTTPS, qatlam, yashirin soha, shifrlash, axborotni berkitish.Abstract
Ushbu maqolada HTTP (HTTPS) protokolining yashirin kanallari va ularda axborot berkitish masalalari koʻrib chiqilgan. Axborotlarni yashirish maqsadida taklif etilgan algoritmda maxfiy ma’lumotlar HTTP so‘rov-paketining sarlavha maydonlariga joylashtiriladi hamda asimmetrik shifrlash algoritmlaridan foydalangan holda shifrlanadi. Shuningdek, uning xavfsizligi ushbu shifrlash algoritmlarining xavfsizligiga bogʻliqligi keltirilgan.
References
Tran C. M. et al. Cross-protocol unfairness between adaptive streaming clients over http/3 and http/2: A root-cause analysis //Electronics. – 2021. – Т. 10. – №. 15. – С. 1755.
Brylinski A. S., Bhattacharjya A. Overview of HTTP/2 //Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing. – 2017. – С. 1-6.
Ganivev, Abduhalil, Obid Mavlonov, and Baxtiyor Turdibekov. "Improving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation." 2021 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2021.
Ghaznavi M. et al. Content Delivery Network Security: A Survey //IEEE Communications Surveys & Tutorials. – 2021. – Т. 23. – №. 4. – С. 2166-2190.
Aliwarga H. K., Satriatama A. H., Pratama B. F. A. Performance comparison of fleet management system using IoT node device based on MQTT and HTTP protocol //AIP Conference Proceedings. – AIP Publishing LLC, 2020. – Т. 2217. – №. 1. – С. 020009.
Wolsing K. et al. A performance perspective on web optimized protocol stacks: TCP+ TLS+ HTTP/2 vs. QUIC //Proceedings of the Applied Networking Research Workshop. – 2019. – С. 1-7.
Akasiadis C., Pitsilis V., Spyropoulos C. D. A multi-protocol IoT platform based on open-source frameworks //Sensors. – 2019. – Т. 19. – №. 19. – С. 4217.
Anderson B. et al. Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption //Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. – 2019. – С. 267-278.
Dong, P., Qian, H., Lu, Z., Lan, S., A Network Covert Channel Based on Packet Classification, International Journal of Network Security, 2012, 14(2), 109–116
Gianvecchio, S., Wang, H., Wijesekera, D., Jajodia, S., Model-based covert timing channels: Automated modeling and evasion, in: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008, LNCS, vol. 5230, Springer, 2008, 211–230
Gianvecchio, S., Wang, H., An Entropy-Based Approach to Detecting Covert Timing Channels, IEEE Transactions on Dependable and Secure Computing, vol.8, issue 6, 2011, 785–797
Jankowski, B., Mazurczyk, W., Szczypiorski, K., PadSteg: Introducing Inter-Protocol Steganography, Telecommunication Systems, 2013, 52(2), 1101–1111
Luo, X., Chan, E., Chang, R., TCP Covert Timing Channels: Design and Detection, In proceedings of:
IEEE International Conference on Dependable Systems and Networks With FTCS and DCC, Anchorage, Alaska, June 24-27, 2008, 420 – 429
Mazurczyk, W., Smolarczyk, M., Szczypiorski, K., On Information Hiding in Retransmissions, Telecommunication Systems: Modelling, Analysis, Design and Management, vol. 52, issue 2, 1113-1121, 2013