Secure socket layer certificate verification: a learning automata approach

With the rapid evolution of the Internet, security has become a major area of concern and, consequently, an interesting research area. Different applications transmit sensitive information over the Internet, which creates increased chances for attackers to look into every piece of data, unless it is secured using secure socket layer SSL certificate. However, the present SSL certificates too face challenges because of various attacks, and these certificates need to be verified before transmitting information. In this paper, we show how the concepts of learning automata LA can be used to verify SSL certificates. The proposed LA-based system can detect safe or unsafe SSL certificates. The LA reward/penalty scheme is used to build the trust value for SSL certificates. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[2]  P. Venkata Krishna,et al.  An adaptive learning approach for fault-tolerant routing in Internet of Things , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[3]  Eric Rescorla,et al.  SSL and TLS: Designing and Building Secure Systems , 2000 .

[4]  Llanos Tobarra,et al.  Formal Verification of the Secure Sockets Layer Protocol , 2008, ICEIS.

[5]  S. Lakshmivarahan,et al.  Learning Algorithms Theory and Applications , 1981 .

[6]  B. John Oommen,et al.  Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  P. Venkata Krishna,et al.  Virtual Backoff Algorithm: An Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks , 2010, IEEE Transactions on Vehicular Technology.

[8]  Ahmad-Reza Sadeghi,et al.  Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[9]  Eyal Kushilevitz,et al.  Learning Automata , 2008, Encyclopedia of Algorithms.

[10]  Julien Freudiger,et al.  The Inconvenient Truth about Web Certificates , 2011, WEIS.

[11]  Emiliano De Cristofaro,et al.  Harvesting SSL Certificate Data to Identify Web-Fraud , 2009, Int. J. Netw. Secur..

[12]  W. Chou Inside SSL: the secure sockets layer protocol , 2002 .

[13]  P. Venkata Krishna,et al.  A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks , 2011, Secur. Commun. Networks.

[14]  P. Venkata Krishna,et al.  A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[15]  P. Venkata Krishna,et al.  A simple learning automata-based solution for intrusion detection in wireless sensor networks , 2011, Wirel. Commun. Mob. Comput..

[16]  P. Venkata Krishna,et al.  A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks , 2011, The Journal of Supercomputing.

[17]  Chen-Nee Chuah,et al.  Dynamic measurement-aware routing in practice , 2011, IEEE Network.

[18]  David W. Chadwick,et al.  Role-Based Access Control With X.509 Attribute Certificates , 2003, IEEE Internet Comput..

[19]  P. Venkata Krishna,et al.  Mitigating denial of service attacks in hierarchical wireless sensor networks , 2011, Netw. Secur..

[20]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[21]  B. John Oommen,et al.  Cybernetics and Learning Automata , 2009, Handbook of Automation.

[22]  P. Venkata Krishna,et al.  An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..

[23]  Jong Hyuk Park,et al.  Personlized English reading sequencing based on learning portfolio analysis , 2014, Inf. Sci..

[24]  Mittal S. Bhiogade Secure Socket Layer , 2001 .

[25]  P. Venkata Krishna,et al.  An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks , 2009, J. Syst. Softw..

[26]  P. Venkata Krishna,et al.  Adaptive link-state routing and intrusion detection in wireless mesh networks , 2010, IET Inf. Secur..