Comparing Black Ridge Transport Access Control (TAC), Brain Waves Authentication Technology and Secure Sockets Layer Visibility Appliance (SSL-VA)

  • Hossein ZareEmail author
  • Mohammad J. Zare
  • Peter Olsen
  • Mojgan Azadi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 800)


This paper, compared three well-known technologies in cybersecurity: BlackRidge Transport Access Control, brain wave authentication technology, and SSL-VA. In addition to the determining the impact of these technologies on cyberspace, we compared them in the viewpoint of the CIA (Confidentiality, Integrity and Availability). Transport Access Control uses the first packet and defines a new real time to identify authorized users. The brain wave authentication technology is used in several ongoing projects that use grand-averaged technology and EEG to develop an authentication mechanism. SSL-VA uses advanced technology to decrypt packets between servers; it also benefits from input aggregation and output mirroring technology to decrypt packets. We also suggest local regulations and in-depth security control awareness when using these technologies and to improve their features.


BlackRidge Transport Access Control Brain waves technology SSL-VA Transport layer protocol First packet End-to-end across network 


  1. 1.
  2. 2.
    Black Ridge Technology: Transport Access Control, revision 12. Retrieved September 30, 2017 from (2010)
  3. 3.
    Black Ridge Technology: Identity-based network and cyber defense. Retrieved September 30, 2017 from (2017)
  4. 4.
    Black Ridge Technology: Black Ridge Technology Transport Access Control: overview. Retrieved September 30, 2017 from (2017)
  5. 5.
    Black Ridge Technology: BlackRidge Enterprise Manager Datasheet. Retrieved September 30, 2017 from (2017)
  6. 6.
    Blue Coat System Inc: Blue Coat SSL Visibility Appliances SV1800 / SV2800 / SV3800. Retrieved September 30, 2017 from (2013)
  7. 7.
    Cisco: The Zettabyte Era: trends and analysis. Cisco Visual Networking Index™. Retrieved September 13, 2017 from (2017)
  8. 8.
    Corporation Symantec: Symantec Corporation SSL Visibility Appliance, document revision 12/22/2016. Retrieved September 30, 2017 from (2016)
  9. 9.
    DeCusatis, C., Liengtiraphan, P., Sager, A., Pinelli, M.: Implementing zero trust cloud networks with transport access control and first packet authentication. In: 2016 IEEE International Conference on Smart Cloud (SmartCloud), pp. 5–10. IEEE (2016)Google Scholar
  10. 10.
    Durumeric, Z., Ma, Z., Springall, D., Barnes, R., Sullivan, N., Bursztein, E., et al.: The security impact of HTTPS interception. In Network and Distributed Systems Symposium. Retrieved September 30, 2017 from (2017)
  11. 11.
    Esentire: Blue Coat expand security industry’s largest collaboration for encrypted traffic. Retrieved September 30, 2017 from (October 2015)Google Scholar
  12. 12.
    Gemalto: Ensuring Trust in SSL-encrypted Networks: Blue Coat SSL Visibility (2017)
  13. 13.
    Gleason, S.: Equifax Shares Tank After Company Announces Data Breach of 143 Million Customers. Retrieved September 13, 2017 from (September 2017)
  14. 14.
    Goodrich, M., Tammasia, R.: Introduction to Computer Security. Pearson Education Inc, Gambrills (2011)Google Scholar
  15. 15.
    Gürkök, H., Nijholt, A.: Brain–computer interfaces for multimodal interaction: a survey and principles. Int. J. Hum. Comput. Int. 28(5), 292–307 (2012)CrossRefGoogle Scholar
  16. 16.
    Hu, J.F.: New biometric approach based on motor imagery EEG signals. In: 2009 International Conference on Future BioMedical Information Engineering (2009)Google Scholar
  17. 17.
    Khalifa, W., Salem, A., Roushdy, M., Revett, K.: A survey of EEG based user authentication schemes. In: 8th International Conference on Informatics and Systems (INFOS), p. BIO-55. IEEE (2012)Google Scholar
  18. 18.
    Marcel, S., Millán, J.D.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 743–752 (2007)CrossRefGoogle Scholar
  19. 19.
    Millán, J.R., Renkens, F., Mourino, J., Gerstner, W.: Noninvasive brain-actuated control of a mobile robot by human EEG. IEEE Trans. Biomed. Eng. 51(6), 1026–1033 (2004)CrossRefGoogle Scholar
  20. 20.
    Min, B.K., Suk, H.I., Ahn, M.H., Lee, M.H., Lee, S.W.: Individual identification using cognitive electroencephalographic neurodynamics. IEEE Trans. Inf. Forensic Secur. 12, 2159–2167 (2017)CrossRefGoogle Scholar
  21. 21.
    Mirace, M.: BlackRidge Technology: Beyond the Firewall. Retrieved September 30, 2017 from (2017)
  22. 22.
    Miracle, M.: BlackRidge Technology. Retrieved September 28, 2017 from (February 2017)
  23. 23.
    Odigicert: What is an SSL certificate and how does it work? Retrieved September, 2017 from (2017)
  24. 24.
    Okin, J.R.: The Internet Revolution: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet. Omnigraphics, Detroit (2005)Google Scholar
  25. 25.
    Palaniappan, R., Mandic, D.P.: EEG based biometric framework for automatic identity verification. J. VLSI Signal Process. Syst. Signal Image Video Technol. 49, 243–250 (2007)CrossRefGoogle Scholar
  26. 26.
    Symantect Corporation: Symantec SSL Visibility SV800/SV1800B/SV2800B/ SV3800B/SV3800B-20 Remove the Security Blind Spots Created by Encrypted Traffic. Retrieved September 30, 2017 from (2016)
  27. 27.
    Symantect Corporation: Seven Reasons to Deploy Blue Coat SSL Visibility with Application Delivery Controllers. Retrieved September 30, 2017 from: (2017)
  28. 28.
    Watson, G.: Could brainwaves replace your passwords? Texas Tech University. Retrieved September 28, 2017 from (September 2016)

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hossein Zare
    • 1
    • 2
    Email author
  • Mohammad J. Zare
    • 3
  • Peter Olsen
    • 4
  • Mojgan Azadi
    • 5
    • 6
  1. 1.Department of Health Services ManagementUniversity of Maryland University College (UMUC)AdelphiUSA
  2. 2.Department of Health Policy and ManagementThe Johns Hopkins UniversityBaltimoreUSA
  3. 3.Department of Computer Science and EngineeringAzad UniversityYazdIran
  4. 4.Department of Computer Science and Electrical EngineeringUniversity of Maryland Baltimore CountyBaltimoreUSA
  5. 5.University of Maryland University CollegeAdelphiUSA
  6. 6.The Johns Hopkins University School of NursingBaltimoreUSA

Personalised recommendations