Methods of counteraction of bypassing two-factor authentication using reverse proxy
dc.contributor.author | Vlasenko, Andrii | |
dc.contributor.author | Stopochkina, Iryna | |
dc.contributor.author | Ilin, Mykola | |
dc.date.accessioned | 2023-05-12T04:29:36Z | |
dc.date.available | 2023-05-12T04:29:36Z | |
dc.date.issued | 2021 | |
dc.description.abstract | The existing solutions for counteracting and preventing the interception of data and tokens of two-factor authentication are considered. Features that may indicate the presence of a silent reverse proxy server are chosen. It is proposed to analyze the information about additional time anomalies, which are usually created by the proxy server. The advantage of this approach is that the time characteristics information is generated on the client-side, and the malicious proxy server cannot modify it. Machine learning methods were used to detect implicit signs of the presence of a proxy server. A new method of detecting a silent reverse proxy server that satisfies the following conditions is proposed: 1) the human factor is minimized, 2) use by an individual user is possible, 3) the method has an acceptable impact on performance and can be used in real-time. | uk |
dc.format.pagerange | Pp. 33-37 | uk |
dc.identifier.citation | Vlasenko, A. Methods of counteraction of bypassing two-factor authentication using reverse proxy / Andrii Vlasenko, Iryna Stopochkina, Mykola Ilin // Theoretical and Applied Cybersecurity : scientific journal. – 2021. – Vol. 3, Iss. 1. – Pp. 33–37. – Bibliogr.: 8 ref. | uk |
dc.identifier.doi | https://doi.org/10.20535/tacs.2664-29132021.1.251299 | |
dc.identifier.uri | https://ela.kpi.ua/handle/123456789/55585 | |
dc.language.iso | en | uk |
dc.publisher | Igor Sikorsky Kyiv Polytechnic Institute | uk |
dc.publisher.place | Kyiv | uk |
dc.relation.ispartof | Theoretical and Applied Cybersecurity: scientific journal, Vol. 3, No. 1 | uk |
dc.subject | two-factor authentication | uk |
dc.subject | silent reverse proxy servers | uk |
dc.subject | prevention | uk |
dc.subject.udc | 004.056 | uk |
dc.title | Methods of counteraction of bypassing two-factor authentication using reverse proxy | uk |
dc.type | Article | uk |
Файли
Контейнер файлів
1 - 1 з 1
Вантажиться...
- Назва:
- 251299-577038-1-10-20220117.pdf
- Розмір:
- 867.45 KB
- Формат:
- Adobe Portable Document Format
- Опис:
Ліцензійна угода
1 - 1 з 1
Ескіз недоступний
- Назва:
- license.txt
- Розмір:
- 9.1 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: