Matteo Varvello, Kyle Schomp, David Naylor, Jeremy Blackburn, Alessandro Finamore, Konstantina Papagiannaki,
Version 2 of the Hypertext Transfer Protocol (HTTP/2) was finalized in May 2015 as RFC 7540. It addresses well-known problems with HTTP/1.1 (e.g., head of line blocking ... e.g., server push and content priority). Though HTTP/2 is designed to be the future of the ... question, we built a measurement platform that monitors HTTP/2 adoption and performance across the Alexa top 1 ... October 2015, we find 68,000 websites reporting HTTP/2 support, of which about 10,000 actually serve ... it. Unsurprisingly, popular sites are quicker to adopt HTTP/2 and 31 % of the Alexa top 100 already ...
Tópico(s): Digital Platforms and Economics
2016 - Springer Science+Business Media | Lecture notes in computer science
Enrico Bocchi, Luca De Cicco, Marco Mellia, Dario Rossi,
... particular on the impact of HTTP/1 vs HTTP/2. We adopt an experimental methodology that uses real ... that we explore to tackle the question whether HTTP/2 improves users experience, to what extent, and in ... report marginal differences, with 22%, 52%, 26% of HTTP/2 MOS being better, identical, or worse than HTTP/1, respectively. Even in scenarios that favor HTTP/2, results are not as sharp as expected. This ... metrics, which instead record a positive impact with HTTP/2 usage. This shows the complexity of understanding the ...
Tópico(s): Image and Video Quality Assessment
2017 - Springer Science+Business Media | Lecture notes in computer science
Amit Praseed, P. Santhi Thilagam,
The introduction of HTTP/2 has led to a dramatic change in web traffic. The steady flow of requests in HTTP/1.1 has ... largely due to the introduction of multiplexing in HTTP/2 which allows users to send multiple requests through ... to launch sophisticated application layer DDoS attacks against HTTP/2 servers. Instead of the intended use of multiplexing, ... Multiplexed Asymmetric Attacks, pose a dangerous threat to HTTP/2 servers and stem from the lack of verification ... In this work, an approach to model an HTTP/2 request set as a fuzzy multiset is presented. ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2021 - Elsevier BV | Expert Systems with Applications
Kyriakos Zarifis, Mark Holland, Manish Jain, Ethan Katz-Bassett, Ramesh Govindan,
With the standardization of HTTP/2, content providerswant to understand the benefits and pitfalls of transitioning to the new standard. Using a large dataset of HTTP/ ... on Akamai's CDN, and a model of HTTP/2 behavior, we obtain the distribution of performance differences ... for nearly 280,000 downloads. We find that HTTP/2 provides significant performanceimprovements in the tail, and, for websites for which HTTP/2 does not improve median performance, we explore how ...
Tópico(s): Peer-to-Peer Network Technologies
2016 - Springer Science+Business Media | Lecture notes in computer science
Erwin Adi, Zubair Baig, Philip Hingston,
... vulnerable to such attacks. With the emergence of HTTP/2 as the successor of HTTP/1.x, existing ... web servers as yet have not migrated to HTTP/2, DoS attack modelling and detection is essential to ... DoS attack traffic that can be directed towards HTTP/2 web servers. The research conducted also extends previous studies that provided DoS attack models against HTTP/2 services, to present a novel and stealthy DoS ...
Tópico(s): Advanced Malware Detection Techniques
2017 - Elsevier BV | Journal of Network and Computer Applications
Nikhil Tripathi, Neminath Hubballi,
HTTP/2 is a newly standardized protocol designed to efficiently utilize the TCP's transmission rate and has ... First we describe few new threat vectors of HTTP/2 which are Slow Rate DoS attacks and can ... proposed attacks using both clear text and encrypted HTTP/2 requests and find that the attack is effective ... attacks with HTTP/1.1 and report that HTTP/2 has more threat vectors compared to its predecessor. ...
Tópico(s): Advanced Malware Detection Techniques
2017 - Elsevier BV | Computers & Security
Amit Praseed, P. Santhi Thilagam,
... are extremely difficult to detect. The introduction of HTTP/2 has been welcomed by developers because it improves ... in this area. Existing research demonstrates that the HTTP/2 protocol allows users to launch DDoS attacks easily, but does not focus on whether an HTTP/2 server can handle DDoS attacks more efficiently or ... this work, we analyse the performance of an HTTP/2 server compared to an HTTP/1.1 server ...
Tópico(s): Advanced Malware Detection Techniques
2019 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security
Mariem Ben Yahia, Yannick Le Louédec, Gwendal Simon, Loutfi Nuaymi, Xavier Corbillon,
... switching between successive video segments. We also propose HTTP/2-based algorithms to apply video frame discarding policies ... algorithms, we request the video frames individually through HTTP/2 multiple streams, and we selectively drop the least meaningful video frames thanks to HTTP/2 stream resetting feature. Our simulations show that the ... also show that requesting video frames separately with HTTP/2 slightly increases the overhead from 4.34% to ...
Tópico(s): Advanced Data Compression Techniques
2019 - Association for Computing Machinery | ACM Transactions on Multimedia Computing Communications and Applications
Hua Wu, Xin Li, Gang Wang, Guang Cheng, Xiaoyan Hu,
... measure the video resolution from traffic. However, with HTTP/2 being gradually adopted in video services, the multiplexing feature of HTTP/2 allows audio and video chunks to be mixed ... monitor resolution for adaptive encrypted video traffic under HTTP/2. We consider the size of the mixed data ... and monitor the QoE of video services under HTTP/2.
Tópico(s): Digital Media Forensic Detection
2022 - Association for Computing Machinery | ACM Transactions on Multimedia Computing Communications and Applications
Biljana Dimitrova, Aleksandra Mileva,
... new covert channels which utilize the new standard, HTTP/2, and which can be used regardless its transport ... is the first research about hiding data in HTTP/2. Also, we give a small survey of existing ... do they work or not work with the HTTP/2.
Tópico(s): Network Security and Intrusion Detection
2017 - Scientific Research Publishing | Journal of Computer and Communications
Zhimin Xu, Xinggong Zhang, Zongming Guo,
... the current DAS systems. With dynamic k-push, HTTP/2 live streaming promises to achieve low live latency ... driven adaptive k-push mechanism (QK-Push) for HTTP/2 live streaming. The client just sends one request ... a discrete space Lagrangian method. We implement an HTTP/2 live streaming prototype system, with the QK-Push ...
Tópico(s): Video Coding and Compression Technologies
2018 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems for Video Technology
Hung T. Le, Thoa Nguyen, Nam Pham Ngoc, Anh T. Pham, Truong Cong Thang,
... has limitations for live streaming. Meanwhile, the new HTTP/2 was standardized in 2015 with many improvements. In this letter, we present a novel HTTP/2-based adaptation scheme for low-delay live streaming over mobile networks. The proposed scheme leverages two HTTP/2 features called server push and stream termination to ...
Tópico(s): Multimedia Communication and Technology
2018 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems for Video Technology
Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Elias Bou‐Harb, Chadi Assi,
... technologies such as Hypertext Transfer Protocol version 2 (HTTP/2) used for signaling and application programming interfaces (APIs) ... solutions in this new architecture. We carefully examine HTTP/2 features, standards, and custom headers, and discuss their ... We comment on the applicability of some known HTTP/2 attacks in 5G SBA in light of the ...
Tópico(s): Advanced Malware Detection Techniques
2022 - Institute of Electrical and Electronics Engineers | IEEE Communications Magazine
Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, Vikas Kumar,
... underwent a consequential enhancement and was released as HTTP/2.HTTP/2 includes pipelining, response multiplexing, server push and header ... to monitor or fingerprint a website running on HTTP/2.This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. ... monitoring a live network traffic, its properties with HTTP/2 is assessed.This study helps understand the different ...
Tópico(s): Network Traffic and Congestion Control
2018 - | Journal of Cyber Security and Mobility
Hung T. Le, Thang Vu, Nam Pham Ngoc, Anh T. Pham, Truong Cong Thang,
... servers, as well as network nodes. The new HTTP/2 protocol provides a server push feature, which allows ... adaptation method to leverage the push feature of HTTP/2. Our method takes into account not only the ...
Tópico(s): Advanced Data Compression Techniques
2016 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Communications
Jeroen van der Hooft, Stefano Petrangeli, Tim Wauters, Rafael Huysegems, Tom Bostoen, Filip De Turck,
... in live streaming scenarios. In the meantime, the HTTP/2 protocol was standardized in February 2015, providing new ... novel push-based approach for HAS, in which HTTP/2’s push feature is used to actively push ...
Tópico(s): Multimedia Communication and Technology
2017 - Springer Science+Business Media | Journal of Network and Systems Management
Mohammad R. Momeni, Zeyu Zhang, David Dell’Angelo, Farnaz A. Shakib,
... calculations. Our computed O2 adsorption energies of Co3(HTTP)2 (HTTP = hexathiotriphenylene), as a representative of the 2D ... adsorptive capability of its redox-active linkers, Co3(HTTP)2 is superior to the analogues 3D MOFs where ... that the conductive behavior of the studied Co3(HTTP)2 2D MOF changes dramatically from metallic in the ...
Tópico(s): 2D Materials and Applications
2021 - American Institute of Physics | APL Materials
Mohammad R. Momeni, Zeyu Zhang, David Dell’Angelo, Farnaz A. Shakib,
... layered electrically conductive Cu3(HHTP)2 and Cu3(HTTP)2 metal-organic frameworks (HHTP = 2,3,6,7,10,11-hexahydroxytriphenylene and HTTP = 2,3,6,7,10,11-hexathiotriphenylene). Comparing water ... open-Cu2+ sites. Theory predicts that in Cu3(HTTP)2 the van der Waals interactions are stronger which ...
Tópico(s): Covalent Organic Framework Applications
2021 - Royal Society of Chemistry | Physical Chemistry Chemical Physics
Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Γεώργιος Καρόπουλος, Stefanos Gritzalis,
... we provide a complete review of attacks against HTTP/2, and elaborate on if and in which way ... quartet of attacks, either stemming directly from the HTTP/2 relevant literature or being entirely new. This scrutiny ...
Tópico(s): Privacy, Security, and Data Protection
2022 - Elsevier BV | Computers & Security
Md Siduzzaman, Md Monir Hossan, Rakibul Alom, Talha Bin Sarwar, M. Saef Ullah Miah,
Abstract HTTP/2 is a cutting-edge Web convention predicated on Google’s SPDY convention which tries to tackle the ... for Online shopping, this paper demonstrates that whether HTTP/2 can authentically avail the performance of an e- ... paper states that we have studied about the HTTP/2 Implementation & performance analysis for prevalent web frameworks, where ... in HTTP, then we have implemented those into HTTP/2. We additionally deployed them on the live server. ... tool has exhibited some errors only for the http/2. This is our only constraint for this work. ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2020 - IOP Publishing | Journal of Physics Conference Series
... 1. However, those defence approaches are incompatible with HTTP/2 because of several operation differences between HTTP/1.1 and its successor, HTTP/2. Also, to the best of our knowledge, no ... to detect Slow Rate DoS attacks against an HTTP/2 supporting web server in real-time . To bridge ... event sequence analysis-based scheme to detect Slow HTTP/2 DoS attacks. Using extensive experiments, we show that ... present a study on the behaviour of popular HTTP/2 servers on the Internet against Slow HTTP/2 DoS attacks. Surprisingly, we noticed that several of ...
Tópico(s): Advanced Malware Detection Techniques
2023 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing
Hussein Bakri, Colin Allison, Alan Miller, Iain Oliver,
... being deployed on the web such as SPDY, HTTP/2 and QUIC seek to reduce latency and routinely ...
Tópico(s): Simulation and Modeling Applications
2015 - Elsevier BV | Procedia Computer Science
Duc V. Nguyen, Hung T. Le, Pham Ngoc Nam, Anh T. Pham, Truong Cong Thang,
... adaptation method for adaptive streaming over the new HTTP/2 protocol, leveraging its server push feature. The method ...
Tópico(s): Advanced Data Compression Techniques
2016 - | IEICE Communications Express
Jeroen van der Hooft, Stefano Petrangeli, Tim Wauters, Rafael Huysegems, Patrice Rondão Alface, Tom Bostoen, Filip De Turck,
... this letter, we discuss the merits of an HTTP/2 push-based approach. We present the details of ...
Tópico(s): Multimedia Communication and Technology
2016 - IEEE Communications Society | IEEE Communications Letters
Sarfraz Ahmad, Muhammad Junaid Arshad,
Hypertext Transfer Protocol-2 (HTTP/2) partially resolved the problem of Head-of-Line Blocking (HoLB) by multiplexing independent messages at the application layer. This enables ... single TCP connection. It makes TCP compatible with HTTP/2, reduces data delivery latency between transport and application ...
Tópico(s): Advanced Wireless Network Optimization
2019 - Institute of Electrical and Electronics Engineers | IEEE Access
Anwang Dong, Zhenjie Mu, Xiangjian Meng, Shuai Li, Jiani Li, Lu Dai, Jianning Lv, Pengfei Li, Bo Wang,
... hybridization. Beyond controlling the EM parameters of Cu3(HTTP)2 (2,3,6,7,10,11-hexahydroxytriphenylene, HHTP), ... among another three isostructural 2D c-MOFs M3(HTTP)2 (M = Zn, Ni, or Co). The strongest EM ...
Tópico(s): Metamaterials and Metasurfaces Applications
2022 - Elsevier BV | Chemical Engineering Journal
Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, V. Anil Kumar,
... underwent a consequential enhancement and was released as HTTP/2. HTTP/2 includes pipelining, response multiplexing, server push and header ... to monitor or fingerprint a website running on HTTP/2. This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. ... monitoring a live network traffic, its properties with HTTP/2 is assessed. This study helps understand the different ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2018 - | Journal of Cyber Security and Mobility
Nguyễn Viết Hưng, Duy Tien Bui, Thanh Lam Tran, Cong Thang Truong, Trương Thu Hương,
... novel approach for 360-degree video streaming over HTTP/2 that can provide consumers with a good watching ... network and user adaptivity. With the support of HTTP/2's stream termination capability, the delivery of late ...
Tópico(s): Multimedia Communication and Technology
2024 - Elsevier BV | Computer Communications
S. Abdullah, Alshammari, Ahmad Al Mogren,
... the current status of HTTP 1.1, SPDY, HTTP/2 and HTTP over UDP protocols. In addition to the analysis and benchmarking of HTTP/2 in modern web services and mobile sensing-based ...
Tópico(s): Water Quality Monitoring Technologies
2016 - OMICS Publishing Group | Journal of Electrical & Electronic Systems
Liang Ming, Yu‐Beng Leau, Ying Xie,
... a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the network transmission speed and ... of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions ... attack detection. By analyzing the distinctive features of HTTP/2 protocol, the study suggests extending DDoS attack detection ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2024 - Institute of Electrical and Electronics Engineers | IEEE Access