改进一次性密码(otp)技术的响应时间,防止radius环境下的重放攻击。

Yusuf Abdullahi, M. B. Mu’azu, A. Adedokun
{"title":"改进一次性密码(otp)技术的响应时间,防止radius环境下的重放攻击。","authors":"Yusuf Abdullahi, M. B. Mu’azu, A. Adedokun","doi":"10.9734/BJAST/2017/29503","DOIUrl":null,"url":null,"abstract":"This research is aimed at the modification of the Remote Access Dial in User Server (RADIUS) protocol with the one-time password (OTP) technique for the authentication environment with a captive portal to prevent replay attacks. One of the important network security measures on a campus network is the use of authentication for identification of legitimate users and one of the most widely used solution in network authentication is the RADIUS protocol. However, there are potential security vulnerabilities in the RADIUS network especially for networks using captive Galley Proof server in a captive portal environment which is 1000 ms [1]. After improving the OTP technique by integrating all the variants of OTP with the RADIUS server on a single server using the simulated ABU campus network using GNS3, the result shows a significant improvement over the above results. The results obtained shows the average response time for TOTP, CROTP and HOTP as 1.3s, 2s and 1.9s. The validation, based on the developed and simulated configuration was carried out using live servers, routers and switches and the results showed improvement over the above results the average response time for TOTP, CROTP and HOTP were obtained as 0.4s, 0.9s and 0.9s respectively. This shows significant improvement in the TOTP, CROPT and HOTP respectively. The result shows the average response time is less than the recommended 1000ms for RADIUS server response time in a captive portal environment.","PeriodicalId":91221,"journal":{"name":"British journal of applied science & technology","volume":"19 1","pages":"1-37"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RESPONSE TIME IMPROVEMENT ON ONE TIME PASSWORD (OTP) TECHNIQUE TO PREVENT REPLAY ATTACK IN A RADIUS ENVIRONMENT.\",\"authors\":\"Yusuf Abdullahi, M. B. Mu’azu, A. Adedokun\",\"doi\":\"10.9734/BJAST/2017/29503\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research is aimed at the modification of the Remote Access Dial in User Server (RADIUS) protocol with the one-time password (OTP) technique for the authentication environment with a captive portal to prevent replay attacks. One of the important network security measures on a campus network is the use of authentication for identification of legitimate users and one of the most widely used solution in network authentication is the RADIUS protocol. However, there are potential security vulnerabilities in the RADIUS network especially for networks using captive Galley Proof server in a captive portal environment which is 1000 ms [1]. After improving the OTP technique by integrating all the variants of OTP with the RADIUS server on a single server using the simulated ABU campus network using GNS3, the result shows a significant improvement over the above results. The results obtained shows the average response time for TOTP, CROTP and HOTP as 1.3s, 2s and 1.9s. The validation, based on the developed and simulated configuration was carried out using live servers, routers and switches and the results showed improvement over the above results the average response time for TOTP, CROTP and HOTP were obtained as 0.4s, 0.9s and 0.9s respectively. This shows significant improvement in the TOTP, CROPT and HOTP respectively. The result shows the average response time is less than the recommended 1000ms for RADIUS server response time in a captive portal environment.\",\"PeriodicalId\":91221,\"journal\":{\"name\":\"British journal of applied science & technology\",\"volume\":\"19 1\",\"pages\":\"1-37\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-01-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"British journal of applied science & technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.9734/BJAST/2017/29503\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"British journal of applied science & technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9734/BJAST/2017/29503","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本研究旨在利用一次性密码(OTP)技术对用户服务器远程接入拨号(RADIUS)协议进行修改,使其适用于带有强制门户的认证环境,以防止重放攻击。校园网中重要的网络安全措施之一是使用认证来识别合法用户,而RADIUS协议是目前应用最广泛的网络认证解决方案之一。然而,在RADIUS网络中存在潜在的安全漏洞,特别是对于在强制门户环境中使用强制Galley Proof服务器的网络,该环境为1000 ms[1]。在使用GNS3模拟的ABU校园网上,通过将所有OTP变体与RADIUS服务器集成到单个服务器上,改进了OTP技术,结果显示比上述结果有显着改善。结果表明,TOTP、CROTP和HOTP的平均响应时间分别为1.3s、2s和1.9s。基于所开发和模拟的配置,使用实时服务器、路由器和交换机进行验证,结果表明,与上述结果相比,TOTP、CROTP和HOTP的平均响应时间分别为0.4s、0.9s和0.9s。这分别显示了TOTP、CROPT和HOTP的显著改善。结果显示,在强制门户环境中,平均响应时间小于建议的RADIUS服务器响应时间1000ms。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
RESPONSE TIME IMPROVEMENT ON ONE TIME PASSWORD (OTP) TECHNIQUE TO PREVENT REPLAY ATTACK IN A RADIUS ENVIRONMENT.
This research is aimed at the modification of the Remote Access Dial in User Server (RADIUS) protocol with the one-time password (OTP) technique for the authentication environment with a captive portal to prevent replay attacks. One of the important network security measures on a campus network is the use of authentication for identification of legitimate users and one of the most widely used solution in network authentication is the RADIUS protocol. However, there are potential security vulnerabilities in the RADIUS network especially for networks using captive Galley Proof server in a captive portal environment which is 1000 ms [1]. After improving the OTP technique by integrating all the variants of OTP with the RADIUS server on a single server using the simulated ABU campus network using GNS3, the result shows a significant improvement over the above results. The results obtained shows the average response time for TOTP, CROTP and HOTP as 1.3s, 2s and 1.9s. The validation, based on the developed and simulated configuration was carried out using live servers, routers and switches and the results showed improvement over the above results the average response time for TOTP, CROTP and HOTP were obtained as 0.4s, 0.9s and 0.9s respectively. This shows significant improvement in the TOTP, CROPT and HOTP respectively. The result shows the average response time is less than the recommended 1000ms for RADIUS server response time in a captive portal environment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信