{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:33:51Z","timestamp":1742956431049,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031600227"},{"type":"electronic","value":"9783031600234"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60023-4_9","type":"book-chapter","created":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T18:02:10Z","timestamp":1719770530000},"page":"40-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fighting TLS Attacks: An Autoencoder-Based Model for\u00a0Heartbleed Attack Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1930-9473","authenticated-orcid":false,"given":"Diana Gratiela","family":"Berbecaru","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Giannuzzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,1]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Rescorla E.: The transport layer security (TLS) protocol: version 1.3. IETF RFC 8446 (2018)","DOI":"10.17487\/RFC8446"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Dierks T., Rescorla E.: The transport layer security (TLS) protocol: version 1.2. IETF RFC 5246 (2008)","DOI":"10.17487\/rfc5246"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Boyd C., Mathuria A., Stebila D.: Protocols for Authentication and Key Establishment. Information Security and Cryptography, 2nd edn. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58146-9","DOI":"10.1007\/978-3-662-58146-9"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Berbecaru D.G., Petraglia G.: TLS-monitor: a monitor for TLS attacks. In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/CCNC51644.2023.10059989","DOI":"10.1109\/CCNC51644.2023.10059989"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201998","author":"D Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1\u201312. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0055716"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-73408-6_18","volume-title":"Public Key Infrastructure","author":"D Berbecaru","year":"2007","unstructured":"Berbecaru, D., Lioy, A.: On the robustness of applications based on the SSL and TLS security protocols. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 248\u2013264. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73408-6_18"},{"key":"9_CR7","unstructured":"Aviram N. et al.: DROWN: breaking TLS with SSLv2. In: 25th USENIX Security Symposium, 10\u201312 August 2016, Austin, TX (USA). https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/aviram. Accessed 5 Sept 2023"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Bhargavan K., Leurent G.: Transcript collision attacks: breaking authentication in TLS, IKE and SSH. In: 23rd Annual Network and Distributed System Security Symposium, NDSS, San Diego, USA (2016). https:\/\/doi.org\/10.14722\/ndss.2016.23418","DOI":"10.14722\/ndss.2016.23418"},{"key":"9_CR9","unstructured":"Heartbleed Bug. https:\/\/heartbleed.com. Accessed 5 Sept 2023"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/978-3-540-45146-4_34","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"B Canvel","year":"2003","unstructured":"Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL\/TLS channel. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 583\u2013599. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_34"},{"key":"9_CR11","unstructured":"Gluck Y., Harris N., Prado A.: BREACH: reviving the CRIME attack. http:\/\/breachattack.com\/. Accessed 5 Sept 2023"},{"key":"9_CR12","unstructured":"Green M.: A diversion: BEAST attack on TLS\/SSL encryption. https:\/\/blog.cryptographyengineering.com\/2011\/09\/21\/brief-diversion-beast-attack-on-tlsssl\/. Accessed 5 Sept 2023"},{"key":"9_CR13","unstructured":"Moller B., Duong T., Kotowicz K.: This POODLE bites: exploiting the SSL 3.0 fallback. https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf. Accessed 5 Sept 2023"},{"key":"9_CR14","unstructured":"Smyth B., Pironti A.: Truncating TLS connections to violate beliefs in web applications. In: 7th USENIX Workshop on Offensive Technologies, WOOT 2013, 13 August 2013, Washington, USA (2013)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Cooper D., Santesson S., Farrell S., Boeyen S., Housley R., Polk W.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF RFC 5280 (2008)","DOI":"10.17487\/rfc5280"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Berbecaru D.G., Lioy A.: An evaluation of X.509 certificate revocation and related privacy issues in the web PKI ecosystem. IEEE Access 11, 79156\u201379175 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3299357","DOI":"10.1109\/ACCESS.2023.3299357"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1002\/spe.2148","volume":"43","author":"D Berbecaru","year":"2013","unstructured":"Berbecaru, D., Casalino, M.M., Lioy, A.: FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface. Softw. Pract. Exper. 43, 1489\u20131518 (2013). https:\/\/doi.org\/10.1002\/spe.2148","journal-title":"Softw. Pract. Exper."},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Stricot-Tarboton S., Chaisiri S., Ko R.K.L.: Taxonomy of man-in-the-middle attacks on HTTPS. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 527\u2013534 (2016). https:\/\/doi.org\/10.1109\/TrustCom.2016.0106","DOI":"10.1109\/TrustCom.2016.0106"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Dierks T., Allen C.: The TLS protocol: version 1.0. IETF RFC 2246 (1999)","DOI":"10.17487\/rfc2246"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Dierks T., Rescorla E: The transport layer security (TLS) protocol: version 1.1. IETF RFC 4346 (2006)","DOI":"10.17487\/rfc4346"},{"key":"9_CR21","unstructured":"Bright P.: Apple, Google, Microsoft, and Mozilla come together to end TLS 1.0. https:\/\/arstechnica.com\/gadgets\/2018\/10\/browser-vendors-unite-to-end-supportfor-20-year-old-tls-1-0\/. Accessed 5 Sept 2023"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/11553595_6","volume-title":"Image Analysis and Processing \u2013 ICIAP 2005","author":"P Laskov","year":"2005","unstructured":"Laskov, P., D\u00fcssel, P., Sch\u00e4fer, C., Rieck, K.: Learning intrusion detection: supervised or unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 50\u201357. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11553595_6"},{"issue":"6","key":"9_CR23","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TNNLS.2018.2790388","volume":"29","author":"M Mahmud","year":"2018","unstructured":"Mahmud, M., Kaiser, M.S., Hussain, A., Vassanelli, S.: Applications of deep learning and reinforcement learning to biological data. IEEE Trans. Neural Netw. Learn. Syst. 29(6), 2063\u20132079 (2018). https:\/\/doi.org\/10.1109\/TNNLS.2018.2790388","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"9_CR24","unstructured":"Giannuzzi S.: Artificial intelligence for security attacks detection. Master Degree Thesis, Politecnico di Torino, Italy (2022). https:\/\/webthesis.biblio.polito.it\/secure\/25562\/1\/tesi.pdf. Accessed 5 Sept 2023"},{"issue":"13","key":"9_CR25","doi-asserted-by":"publisher","first-page":"4294","DOI":"10.3390\/s21134294","volume":"21","author":"Y Song","year":"2021","unstructured":"Song, Y., Hyun, S., Cheong, Y.-G.: Analysis of autoencoders for network intrusion detection. Sensors 21(13), 4294 (2021). https:\/\/doi.org\/10.3390\/s21134294","journal-title":"Sensors"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"107968","DOI":"10.1016\/j.dib.2022.107968","volume":"41","author":"D Canavese","year":"2022","unstructured":"Canavese, D., Regano, L., Basile, C., Ciravegna, G., Lioy, A.: Data set and machine learning models for the classification of network traffic originators. Data Brief 41, 107968 (2022). https:\/\/doi.org\/10.1016\/j.dib.2022.107968","journal-title":"Data Brief"},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"108346","DOI":"10.1109\/ACCESS.2020.3001350","volume":"8","author":"S Zavrak","year":"2020","unstructured":"Zavrak, S., Iskefiyeli, M.: Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access 8, 108346\u2013108358 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3001350","journal-title":"IEEE Access"},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"Berbecaru D.G., Giannuzzi S., Canavese D.: Autoencoder-SAD: an autoencoderbased model for security attacks detection. In: 2023 IEEE Symposium on Computers and Communications (ISCC), Gammarth, Tunisia, pp. 758\u2013763 (2023). https:\/\/doi.org\/10.1109\/ISCC58397.2023.10217930","DOI":"10.1109\/ISCC58397.2023.10217930"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"94352","DOI":"10.1109\/ACCESS.2021.3093830","volume":"9","author":"U Sabeel","year":"2021","unstructured":"Sabeel, U., Heydari, S.S., Elgazzar, K., El-Khatib, K.: Building an intrusion detection system to detect atypical cyberattack flows. IEEE Access 9, 94352\u201394370 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3093830","journal-title":"IEEE Access"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Michelucci U.: An introduction to autoencoders. https:\/\/arxiv.org\/abs\/2201.03898, https:\/\/doi.org\/10.48550\/arXiv.2201.03898. Accessed 5 Sept 2023","DOI":"10.48550\/arXiv.2201.03898"},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"Hinton G.E., Srivastava N., Krizhevsky A., Sutskever I., Salakhutdinov R.R.: Improving neural networks by preventing co-adaptation of feature detectors (2012). https:\/\/doi.org\/10.48550\/arXiv.1207.0580.Last accessed 5 Sept 2023","DOI":"10.48550\/arXiv.1207.0580."},{"key":"9_CR32","unstructured":"Random Forest Classifier. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.ensemble.RandomForestClassifier.html. Accessed 5 Sept 2023"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60023-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T18:02:50Z","timestamp":1719770570000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60023-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031600227","9783031600234"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60023-4_9","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2023.haw-hamburg.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}