Organizer: Prof. Michael Waidner, CYSEC / Fraunhofer SIT
With the development of highly efficient network infrastructure, research in networking community is now focused towards the development of application layer protocols which can utilize the potential and capability of underlying infrastructure to the fullest. It is also argued that the most popular application layer protocol, HTTP/1.1, is not able to efficiently utilize TCP’s transmission capacity as it suffers from Head-of-Line (HoL) blocking. This can be viewed as a negative impact on a web application’s performance. Such issues motivated researchers to develop HTTP/2 which not only supports all the basic features of HTTP/1.1 but also is very efficient in utilizing TCP’s transmission capacity. As HTTP/2 is a new protocol, the research community has not paid much attention on the security issues or vulnerabilities in HTTP/2.
Thus, a proper understanding of possible threats that may affect normal operation of a widely popular protocol such as HTTP/2 is essential to develop appropriate detection and mitigation methods. The talk will first cover threat vectors which can be exploited by an attacker to launch a class of DoS attacks called Slow Rate DoS attacks against an HTTP/2 web server and then present a comparison between HTTP/1.1 and HTTP/2 on the basis of threat vectors. Subsequently the talk will also cover some of the possible mechanisms which can be deployed as a first line of defense to counter these attacks.
Nikhil Tripathi received his Ph.D. in May 2018 from Computer Science and Engineering Indian Institute of Technology Indore, India. His research interests are Network Security, Computer Networks and System Security.