dc.creatorBareño-Gutiérrez, Raúl
dc.creatorLópez Sevillano, Alexandra María
dc.creatorDíaz Piraquive, Flor Nancy (1)
dc.creatorGonzález-Crespo, Rubén (1)
dc.date.accessioned2022-03-18T09:13:00Z
dc.date.accessioned2023-03-07T19:35:33Z
dc.date.available2022-03-18T09:13:00Z
dc.date.available2023-03-07T19:35:33Z
dc.date.created2022-03-18T09:13:00Z
dc.identifier9783030816346
dc.identifier1865-0929
dc.identifierhttps://reunir.unir.net/handle/123456789/12675
dc.identifierhttps://doi.org/10.1007/978-3-030-81635-3_27
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/5906961
dc.description.abstractThe transactional websites and services on the cloud, have actually become the most used browsers, thanks to their portability and ease of use, with a significant increase in the development of cloud solutions, implementing digital contexts under the 4.0 web, which generated an increase of possibilities for transactions of different types. However, every time more security issues arise. Due to this problem, the computer security is a rising trend, generating new possibilities to mitigate vulnerabilities when handling the information in a transactional web site; an analysis is made of performance, weaknesses and strengths of the HSTS standard, as a security complement of the SSL/TLS protocol. Different tests scenarios are verified under a man attack in the MITM environment, to intercept or capture the traffic sent and received during web transactions. That is how we identify if the standard can prevent that intrusion, which is of vital importance for the different transactional environments actually used, such as bank entities or online purchases; vulnerabilities of the standard are verified upon making the first request to a website, which strengthens and secures transactions done from the beginning of the transaction to its ending, in an encrypted way. Browsers analyzed - Mozilla Firefox, Google Chrome and internet Explorer, under controlled corporate and personal environments; The security importance of the browser is outlined, Google Chrome being the best one in performance under an internet hacking. The other browsers present some shortcomings during the first interconnection request, during some milliseconds under the point to point model, for the initial phase of information interchange
dc.languageeng
dc.publisherSpringer Science and Business Media Deutschland GmbH
dc.relation;vol. 1438
dc.relationhttps://link.springer.com/chapter/10.1007/978-3-030-81635-3_27
dc.rightsrestrictedAccess
dc.subjectA hacker in the MITM environment
dc.subjectHSTS complement
dc.subjectsecurity
dc.subjectWEB browsers
dc.subjectScopus(2)
dc.titleAnalysis of WEB Browsers of HSTS Security Under the MITM Management Environment
dc.typeconferenceObject


Este ítem pertenece a la siguiente institución