Skip to main content

Showing 1–5 of 5 results for author: Antikainen, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1912.04669  [pdf, other

    cs.CR

    Client-side Vulnerabilities in Commercial VPNs

    Authors: Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura

    Abstract: Internet users increasingly rely on commercial virtual private network (VPN) services to protect their security and privacy. The VPN services route the client's traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client's real IP address from online services, and they also shield the user's connections from perceived threats in the access networks. In this paper, we… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: A refined version of this draft, with the same title, has been published in the 24th Nordic Conference on Secure IT Systems (NordSec 19). It is accessible here: https://link.springer.com/chapter/10.1007/978-3-030-35055-0_7

  2. arXiv:1911.12332  [pdf, other

    cs.CR

    XSS Vulnerabilities in Cloud-Application Add-Ons

    Authors: Thanh Bui, Siddharth Rao, Markku Antikainen, Tuomas Aura

    Abstract: Cloud-application add-ons are microservices that extend the functionality of the core applications. Many application vendors have opened their APIs for third-party developers and created marketplaces for add-ons (also add-ins or apps). This is a relatively new phenomenon, and its effects on the application security have not been widely studied. It seems likely that some of the add-ons have lower c… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  3. arXiv:1810.08415  [pdf, other

    cs.CR

    IoT-KEEPER: Securing IoT Communications in Edge Networks

    Authors: Ibbad Hafeez, Markku Antikainen, Aaron Yi Ding, Sasu Tarkoma

    Abstract: The increased popularity of IoT devices have made them lucrative targets for attackers. Due to insecure product development practices, these devices are often vulnerable even to very trivial attacks and can be easily compromised. Due to the sheer number and heterogeneity of IoT devices, it is not possible to secure the IoT ecosystem using traditional endpoint and network security solutions. To add… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: 20 pages, 9 figures, 4 tables

  4. arXiv:1712.05958  [pdf, ps, other

    cs.CR

    Toward Secure Edge Networks Taming Device to Device (D2D) Communication in IoT

    Authors: Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma

    Abstract: The growing popularity of Internet-of-Things (IoT) has created the need for network-based traffic anomaly detection systems that could identify misbehaving devices. In this work, we propose a lightweight technique, IoT-guard, for identifying malicious traffic flows. IoT-guard uses semi-supervised learning to distinguish between malicious and benign device behaviours using the network traffic gener… ▽ More

    Submitted 16 October, 2018; v1 submitted 16 December, 2017; originally announced December 2017.

    Comments: Appeared in 12th International Conference on Network and System Security, NSS, August 2018 (http://www4.comp.polyu.edu.hk/~nss2018/program.html)

  5. arXiv:1602.05853  [pdf, other

    cs.NI

    XBF: Scaling up Bloom-filter-based Source Routing

    Authors: Markku Antikainen, Liang Wang, Dirk Trossen, Arjuna Sathiaseelan

    Abstract: A well known drawback of IP-multicast is that it requires per-group state to be stored in the routers. Bloom-filter based source-routed multicast remedies this problem by moving the state from the routers to the packets. However, a fixed sized Bloom-filter can only store a limited number of items before the false positive ratio grows too high implying scalability issues. Several proposals have tri… ▽ More

    Submitted 18 February, 2016; originally announced February 2016.