An Investigation on HTTP/2 Security
DOI:
https://doi.org/10.13052/2245-1439.7112Keywords:
HTTP, HTTP/2, SPDY, Server Push, HPACKAbstract
In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security. Furthermore the world is becoming progressively digital by the passing of each minute.Alarge portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP). But in 2015, it underwent a consequential enhancement and was released as HTTP/2. HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACKbesides the properties of HTTP/1.1. These properties make it difficult for the eavesdroppers to monitor or fingerprint a website running on HTTP/2. This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. By monitoring a live network traffic, its properties with HTTP/2 is assessed. This study helps understand the different aspects of the protocol and its influence on the network and browsers.
Downloads
References
Berners-Lee, T., Fielding, R., and Frystyk, H. (1996). Hypertext transfer protocol–HTTP/1.0 (No. RFC 1945).
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T. (1999). Hypertext transfer protocol–HTTP/1.1 (No. RFC 2616).
Rescorla, E. (2000). RFC 2818, HTTP Over TLS. Internet Engineering Task Force. May 2000.
Hodges, J., Jackson, C., and Barth, A. (2012). Http strict transport security (hsts) (No. RFC 6797).
Belshe, M., Thomson, M., and Peon, R. (2015). Hypertext transfer protocol version 2 (http/2).
Peon, R., and Ruellan. H. (2015). RFC 7541, HPACK: Header Compression for HTTP/2. Internet Engineering Task Force. May 2015.
Adi, E. (2017). Denial-of-service attack modelling and detection for HTTP/2 services. Doctorates and Masters Theses, Edith Cowan University, 2017.
Hacker Intelligent Initiative HTTP/2:In-depth analysis of the top four flaws of the next generation web protocol. Red Hat conference Publication By Imperva Defense Center, 2016.
Tripathi, N., and Hubballi, N. (2018). Slow rate denial of service attacks against HTTP/2 and detection. Computers & Security, 72, 255–272.
Corbel, R., Stephan, E., and Omnes, N. (2016, July). HTTP/1.1 pipelining vs HTTP2 in-the-clear: Performance comparison. In 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), (pp. 1–6).
Jackson, B. (2017). HTTP/2 Statistics KeyCDN Report on HTTP/2 Distribution. Available at: https://www.keycdn.com/blog/http2-statistics/
Winkel, S. (2015). Network Forensics and HTTP/2 SANS Institute InfoSec Reading Room, December 2015.
Binu, P. K., Sreekutty, H. L., and Sreekutty, V. S. (2016). Security plugin for Mozilla which integrates cryptography and steganography features. In 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), (pp. 1–6).
de Saxcé, H., Oprescu, I., and Chen, Y. (2015). Is HTTP/2 really faster than HTTP/1.1. In 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), (pp. 293–299).
Wang, S., Xu, D., and Yan, S. (2010). Analysis and application of Wireshark in TCP/IP protocol teaching. In 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT), (Vol. 2, pp. 269–272).
Newmarch, J. (2017). Network Programming with Go: Essential Skills for Using and Securing Networks. Apress. (8)137–160, 2017.
Varvello, M., Schomp, K., Naylor, D., Blackburn, J., Finamore, A., and Papagiannaki, K. (2016). Is the web http/2 yet?. In International Conference on Passive and Active Network Measurement (pp. 218–232). Springer, Cham.
CVE-2016-0150. In. Vulnerability Information HTTP.sys Denial of Service Vulnerability, 2016
CVE-2016-1546 In. low: mod http2: denial of service by thread starvation, 2016.
Cui, Y., Li, T., Liu, C., Wang, X., and K’hlewind, M. (2017). Innovating transport with QUIC: Design approaches and research challenges. IEEE Internet Computing, 21(2), 72–76.
Sreedhanya, A. V., and Soman, K. P. (2012). Secrecy of cryptography with compressed sensing. In 2012 International Conference on Advances in Computing and Communications (ICACC), (pp. 207–210).
Bakri, H., Allison, C., Miller, A., and Oliver, I. (2015). HTTP/2 and QUIC for Virtual Worlds and the 3D Web. Procedia Computer Science, 56, 242–251.