Work place: HKBK College of Engineering / Department of Information Science and Engineering VTU, HKBKCSERC, Bangalore- 560045, India
E-mail: uaijaz9@gmail.com
Website:
Research Interests: Computer systems and computational processes, Information Security, Network Security, Data Structures and Algorithms, Information-Theoretic Security
Biography
Mr. Usman Aijaz N did his B.E in (ISE) from Vidya Vikas College of Engineering in the year 2004, Mysore, VTU University, India. M.Tech (CSE) from Dayanand Sagar College of Engineering in the year 2010, Bangalore, VTU University, India. Currently pursuing a Ph.D. (CSE) in Cyber Security from VTU University, India. He is having 15 years of teaching experience as an Assistant Professor. Currently, he is working as an Assistant professor at HKBK College of Engineering in Information Science and Engineering (ISE) Department, Bangalore, India. He has published two papers one in Springer and the other in the IEEE International Conference on cyber security. His research area is Cyber Security and Machine Learning.
By Usman Aijaz N Nikita Mittal Mohammed Misbahuddin A Syed Mustafa
DOI: https://doi.org/10.5815/ijwmt.2022.01.05, Pub. Date: 8 Feb. 2022
Single Sign-On (SSO) allows the client to access multiple partner e-services through a single login session. SSO is convenient for the users as the user neither needs to set multiple login credentials nor login separately for individual services every time. SSO (single sign-on) authentication is a password-authentication approach that permits end users to login into multiple systems and websites with a single set of login credentials. SSO authentication is mainly useful for IT organizations that consist of many different commercial applications. The outstanding feature of SSO is that it gives organizations centralized control of their systems by giving different levels of access to each individual. It reduces password fatigue and increases security because users only need to remember a single username/password that grants them access to multiple systems. However, the Single Sign-on poses risks related to a single point of attack which may lead to a path for cybercrimes. This paper proposes a trust model to increase the security of Single Sign-on systems against the vulnerabilities discussed in the subsequent sections. The proposed Trust model is named as DANE-based Trust Plugin (DTP) which acts as an added security layer over DNS Based Authentication of Named entities(DANE). The DTP proposes the modified SAML XML schema which enables the DTP to counter the attacks.
[...] Read more.By Usman Aijaz N Syed Mustafa Mohammed Misbahuddin
DOI: https://doi.org/10.5815/ijwmt.2021.06.04, Pub. Date: 8 Dec. 2021
DNS is responsible for the hostname to IP address translation. It is an open resolver that's why vulnerable to different kinds of attacks such as cache poisoning, man-in-the-middle, DOS and DDOS, etc. DNS is responsible for the hostname to IP address translation. To protect DNS IETF added a layer of security to it known as Domain Name System Security Extensions (DNSSEC). DNSSEC is also vulnerable to phishing, spoofing, and MITM attacks. To protect DNS, along with DNSSEC we require certifying authorities to authenticate the communicating parties. DNSSEC combined with an SSL certificate issued by Certifying Authorities (CA's) can protect the DNS from various attacks. The main weakness of this system is there are too many CA's and It is not feasible to trust all of them. Any breached CA can issue a certificate for any domain name. A certificate issued from a compromised CA's is valid. In this scenario, it is necessary for the organization to limit the number of CAs and to check whether the server is signed by a trusted CA's or not. DNS Based Authentication of Named Entities (DANE) permits a domain possessor to stipulate specific CA's issue certificates for a specific resource. DANE will not allow any CA to issue certificates for any domain. It limits the number of CA's used by the client. As there were still some security issues left in it that can be resolved using a mechanism called D-TS. It is a DANE-based trusted server that acts as a third party and validates the certificates of all the entities of the network. D-TS will be a proof-of-concept for enhancing the security in communications between Internet applications by using information available in DNS. The system attempts to solve the shortcomings of DANE by establishing a trust zone between the clients and the services. By adding multiple levels of validations, it aims to provide improved authenticity of services to clients, thereby mitigating attacks like phishing, Spoofing, Dos, and man-in-the-middle attack. In this paper, we will discuss the detailed working of our proposed solution D-TS.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals