Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Dabi, N."

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Enabling Support for TLS and TLS Fingerprinting in Network Stack Tester
    (Institute of Electrical and Electronics Engineers Inc., 2024) Dabi, N.; Tahiliani, M.P.; Rathod, V.J.
    Transport Layer Security (TLS) is the standard protocol widely used for securing client-server communications over the Internet. It ensures the confidentiality and integrity of data transmitted between systems. With the rising deployment of TLS 1.3, which is the latest version of the protocol, stronger encryption and improved security features are introduced. The adoption of TLS 1.3 brings about the need for techniques such as TLS fingerprinting. TLS fingerprinting involves analyzing the unique characteristics of TLS handshakes to identify and classify different implementations or configurations of TLS. However, researchers currently lack a dedicated platform to test TLS and TLS fingerprinting techniques in a controlled environment. To address this gap, we aim to enhance NeST (Network Stack Tester) by adding support for TLS and TLS fingerprinting. NeST is a Python tool for network emulation that internally uses Linux network namespaces and Linux utilities to create virtual testbeds, perform experiments using various network protocols and collect statistics. By integrating TLS and TLS fingerprinting into NeST, we provide an easy-to-use tool that enables researchers to experiment with TLS, analyze TLS traffic, and evaluate the effectiveness of TLS fingerprinting techniques. © 2024 IEEE.

Maintained by Central Library NITK | DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify