Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Viability of Adaptive Network Security Exercising Tradeoff between Performance and Security

Author(s): Malik Basit Ahmad and Parul Agarwal*

Volume 13, Issue 5, 2020

Page: [893 - 900] Pages: 8

DOI: 10.2174/2213275912666190628100621

Price: $65

conference banner
Abstract

Background: The client-server operations involving the financial transactions are liable to be carried in secure and controlled environment which is provided by Secure Socket Layer protocol in order to vanquish possibility of threats and attacks. In this protocol, the handshake mechanism plays an imperative role, negotiating security policy between client and server. The consolidated security policy between the communicating parties depends upon the level of threat or an attack at an instance subject to change.

Objective: Transformation of Secure Socket Layer protocol into the Adaptive model wherein the cryptographic algorithms are selected from the series at runtime depending upon the changing external factors. Further, the reoriented model can be used for web server load management as well.

Method: Over-taking control of Renegotiation process by separating it from Web Service Configuration and perform renegotiations based on evaluated performance of cryptographic techniques.

Results: Experiments to obtain performance of cryptographic algorithms were done using OpenSSL utility running in Ubuntu-64 bit on 8th generation, i3-8130U runs 2.20 GHz processor and 4 G.B RAM. We enunciated, Data Encryption Standard was slower but ideally secure symmetric, RSA- 512 outnumbers the verifications per second and Message Digest-4 is fastest Symmetric.

Conclusions: In this paper, a legacy security system has been reshaped to adapt security at runtime. Further, the offline performance of cryptographic algorithms has been evaluated based on which third party makes decisions. Following this, a trade-off policy between security and performance is formulated such that the model can be optimized easily.

Keywords: Adaptive SSL, transport layer security, cryptography, security, performance.

Graphical Abstract

[1]
El-Hennawy ME, Dakroury YH, Kouta MM, El-Gendy MM. An adaptive security/performance encryption system Proceedings of the International Conference on Electrical, Electronic and Computer Engineering ICEEC ’04. 245-8.
[2]
Marchany RC, Tront JG. E-Commerce security issues
[3]
Claessens J, Dem V, De Cock D, Preneel B, Vandewalle J. On the Security of Today’s Online Electronic Banking Systems 2002.
[4]
Prestige AB, Widianto ED, Hidayatullah ET. Performance comparisons of web server load balancing algorithms on HAProxy and heartbeat
[5]
Pateriya RK. Web server load management with adaptive SSL and admission control mechanism
[8]
Krupitzer C, Roth FM, Sickle SV, Schiele G, Becker C. A survey of engineering approaches for self-adaptive systems. Pervasive Mobile Comput 2015; 17: 184-206.
[9]
Andrus F. Beyond scan and block: An adaptive approach to network access control. Netw. Sec 2011; pp. 5-9.
[10]
Kephart J O, Chess D M. The vision of autonomic computing 2003.
[11]
Moreno GA. Adaptation timing in self-adaptive systems 2017.
[12]
Teo L, Ahn GJ, Zheng Y. Dynamic and risk aware network access management
[13]
“On the security of SSL/TLS-enabled applications”, Appl Comput Inform. Elsevier 2014; pp. 68-81.
[14]
Lamprecht CJ, Morsel APAV. Runtime security adaptation using adaptive SSL Proceedings of the 14th IEEE Pacific Rim International Symposium Dependable Computing. 305-12.
[15]
Stallings W. Cryptography and Network Security: Principles and Practices. London, United Kingdom: Pearson 2014.
[16]
Chaudhari M P, Patel S R. A survey on cryptography algorithms
[17]
Patel BK, Pathak M. Survey on cryptography algorithms 2014.
[18]
Rehák M, Pechoucek M, Grill M, Stiborek J, Bartoš K, Celeda P. Adaptive multiagent system for network traffic monitoring. IEEE Intell Syst 2009; •••: 16-25.
[http://dx.doi.org/10.1109/MIS.2009.42]
[19]
Kerravala Z, Campbell N, Turner R, Metzler J, Maurer R, Smithers R. Industry experts speak out: The network performance and security trade-off 2014.http://www.webtorials.com/main/resource/papers/McAfee/paper41/network-performance-security-trade-off.pdf
[20]
Aluminum DSA, Kader HMA, Hadhoud MM. Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur 2010; 10(3): 213-9.
[22]
Barnes R, Thomson M, Pironti A, Langley A. Deprecating secure sockets layer version 30 2015.
[23]
Oppliger R. SSL and TLS: Theory and Practice. Norwood, United States: Artech House 2016.
[24]
Dougherty FL, Ambler NP, Triantis KP. A complex adaptive systems approach for productive efficiency analysis: Building blocks and associative inferences. Ann. Operat. Res 2017; Vol. 250.
[http://dx.doi.org/10.1007/s10479-016-2134-3]
[25]
Torjusen AB, Abie H, Paintsil E, Trcek D, Skomedal A. Towards run-time verification of adaptive security for IoT in e-health Proceedings of the European Conference on Software Architecture Workshops. 1-8.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy