Security and service vulnerabilities with HTTP/3

Show simple item record

dc.contributor.author Sudhan S., Hari Hara
dc.contributor.author Kulkarni, Sameer G.
dc.contributor.other 16th International Conference on Communication Systems & Networks (COMSNETS 2024)
dc.coverage.spatial India
dc.date.accessioned 2024-03-07T14:53:16Z
dc.date.available 2024-03-07T14:53:16Z
dc.date.issued 2024-01-03
dc.identifier.citation Sudhan S., Hari Hara and Kulkarni, Sameer G., "Security and service vulnerabilities with HTTP/3", in the 16th International Conference on Communication Systems & Networks (COMSNETS 2024), Bengaluru, IN, Jan. 3-7, 2024.
dc.identifier.uri https://doi.org/10.1109/COMSNETS59351.2024.10427406
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/9838
dc.description.abstract The adoption of Hypertext Transfer Protocol v3 (HTTP/3 or H3) is on the rise. In this context, we analyze the security vulnerabilities of H3, specifically with the QUIC protocol, and the associated challenges they pose to the commonly used network middleboxes. First, we demonstrate how the connection migration feature of QUIC can be used by malicious clients to launch denial of service (DoS) attacks through resource exhaustion of the connection state tables in the simple network address and port translation (NAPT) devices. Further, we show that the connection migration feature disrupts the services of various critical network middleboxes like Layer3/4 load-balancers, rate-limiters, and intrusion detection/prevention systems that rely on the connection state table for their faithful operation. We also present a feasible solution to mitigate the DoS attacks in connection tracking middleboxes. Second, we show how the spin bit in QUIC short header packets can act as a highly reliable covert channel to exchange information stealthily across two end-points. Nonetheless, this spin-bit can also be used to shield from spoofing attacks. Although H3, by virtue of QUIC, aims to be a secure and privacy-preserving protocol, the existence of such vulnerabilities calls for the community to explore and adopt additional measures to make H3 a truly secure protocol.
dc.description.statementofresponsibility by Hari Hara Sudhan S. and Sameer G. Kulkarni
dc.language.iso en_US
dc.publisher Institute of Electrical and Electronics Engineers
dc.subject HTTP/3
dc.subject QUIC
dc.subject Security
dc.subject Denial of service
dc.subject Middlebox
dc.subject Network functions
dc.title Security and service vulnerabilities with HTTP/3
dc.type Conference Paper


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account