Ayman Mohammed Muzzamail Albashear, H. Ali, Abeer M. Ali
{"title":"Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout : Key Compromise Impersonation Attack as Study Case","authors":"Ayman Mohammed Muzzamail Albashear, H. Ali, Abeer M. Ali","doi":"10.1109/ICCCEEE.2018.8515845","DOIUrl":null,"url":null,"abstract":"A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired then the sender will assume that this segment has been lost. This paper proposed another use of the RTO concept in order to secure the TLS session. It calculates a Secure Session RTO or SSRTO which is based on RTO equation between the sender and receiver in a TLS protocol. It is assumed that the man in the middle is in need of the time factor in order to trigger a KCI attack. at the server side, by calculating the time needed to start a TLS Handshake Protocol, until TLS Record Protocol, and if it is found that it took an appreciable time we may assume that there is an attacker. The action in this case, is to cut off the session between the sender and the receiver.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"8 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCEEE.2018.8515845","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired then the sender will assume that this segment has been lost. This paper proposed another use of the RTO concept in order to secure the TLS session. It calculates a Secure Session RTO or SSRTO which is based on RTO equation between the sender and receiver in a TLS protocol. It is assumed that the man in the middle is in need of the time factor in order to trigger a KCI attack. at the server side, by calculating the time needed to start a TLS Handshake Protocol, until TLS Record Protocol, and if it is found that it took an appreciable time we may assume that there is an attacker. The action in this case, is to cut off the session between the sender and the receiver.