Main Article Content
Abstract
Hypertext Transfer Protocol Secure (https) has many advantages in terms of performance and security; most importantly, it achieves higher quality standards than Hypertext Transfer Protocol (http). All browsers strongly advise users to trust websites that use HTTPS because it is the only way to protect themselves from a number of risks, attacks, in this paper, the most important characteristics of HTTPS versus HTTP will discussed, and Tested based on software engineering concepts and selected test tool in comparison with Software Quality Factors.
Keywords
Article Details
Copyright (c) 2025 Ahmed Saleem Abbas , Noor Thamer Mahmood, Rusul Khalil Hussein (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
- V. K. Madasu, “Web authentication and authorization and role of HTTP, HTTPS protocol in networking,” JMEST, vol. 2, no. 3, pp. 381–383, 2015.
- M. Husák, M. Čermák, T. Jirsík, and P. Čeleda, “Network-based HTTPS client identification using SSL/TLS fingerprinting,” in Proc. 10th Int. Conf. Availability, Reliability and Security (ARES), 2015, pp. 389–396, doi: https://doi.org/10.1109/ARES.2015.35.
- A. Goldberg, R. Buff, and A. Schmitt, “Comparison of HTTP and HTTPS performance,” in Proc. C. Conf., vol. 1, pp. 226–230, 1998.
- R. S. Pressman, Software Engineering: A Practitioner’s Approach, 8th ed. New York, NY, USA: McGraw-Hill, 2014.
- K. Cheng, M. Gao, and R. Guo, “Analysis and research on HTTPS hijacking attacks,” in Proc. 2nd Int. Conf. Networks Security, Wireless Communications and Trusted Computing (NSWCTC), vol. 2, 2010, pp. 223–226, doi: https://doi.org/10.1109/NSWCTC.2010.187.
- P. K. Janbandhu, “Implementing HTTPS for securing web servers,” 2019, doi: https://doi.org/10.13140/RG.2.2.26172.39042/1.
- J. Müthing, T. Jäschke, and C. M. Friedrich, “Client-focused security assessment of mHealth apps and recommended practices to prevent or mitigate transport security issues,” JMIR mHealth and uHealth, vol. 5, no. 10, 2017, doi: https://doi.org/10.2196/mhealth.7791.
- M. C. Tran, M. H. Nguyen, and T. Q. Nguyen, “An application for monitoring and analysis of HTTP communications,” Journal of Communications, vol. 13, no. 8, pp. 456–462, 2018, doi: https://doi.org/10.12720/jcm.13.8.456-462.
- M. Jørgensen, “Software quality measurement,” Advances in Engineering Software, vol. 30, no. 12, pp. 907–912, 1999, doi: https://doi.org/10.1016/S0965-9978(99)00015-0.
- D. Nabil, A. Mosad, and H. A. Hefny, “Web-based applications quality factors: A survey and a proposed conceptual model,” Egyptian Informatics Journal, vol. 12, no. 3, pp. 211–217, 2011, doi: https://doi.org/10.1016/j.eij.2011.09.003.
- B. W. Boehm, “Software engineering—as it is,” in Software Engineering: Barry W. Boehm’s Lifetime Contributions to Software Development, Management, and Research, pp. 663–685, 2007, doi: https://doi.org/10.1109/9780470187562.ch8.
- D. Galin, “Software quality factors (attributes),” in Software Quality: Concepts and Practice, pp. 23–44, 2018,doi:https://doi.org/10.1002/9781119134527.ch2.
- M. Kassim, M. Ismail, K. Jumari, and M. I. Yusof, “Bandwidth gain analysis for HTTP and HTTPS traffic on IP-based networks,” in IEEE Symp. Wireless Technology and Applications (ISWTA), 2012, pp. 303–308, doi: https://doi.org/10.1109/ISWTA.2012.6373866
- S. Dyllan, H. Dahimene, P. Wright, and P. Xiao, “Analysis of HTTP and HTTPS usage on the university Internet backbone links,” Journal of Industrial and Intelligent Information, vol. 2, no. 1, pp. 67–70, 2014, doi: https://doi.org/10.12720/jiii.2.1.67-70.
- M. Husák, M. Čermák, T. Jirsík, and P. Čeleda, “HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting,” EURASIP Journal on Information Security, vol. 2016, no. 1, pp. 1–14, 2016, doi: https://doi.org/10.1186/s13635-016-0030-7.
- D. Naylor et al., “The cost of the ‘S’ in HTTPS,” in Proc. ACM Conf. Emerging Networking Experiments and Technologies (CoNEXT), 2014, pp. 133–139, doi: https://doi.org/10.1145/2674005.2674991.
- H. Kolamunna et al., “Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices,” 2016. [Online]. Available: http://arxiv.org/abs/1608.04180
References
V. K. Madasu, “Web authentication and authorization and role of HTTP, HTTPS protocol in networking,” JMEST, vol. 2, no. 3, pp. 381–383, 2015.
M. Husák, M. Čermák, T. Jirsík, and P. Čeleda, “Network-based HTTPS client identification using SSL/TLS fingerprinting,” in Proc. 10th Int. Conf. Availability, Reliability and Security (ARES), 2015, pp. 389–396, doi: https://doi.org/10.1109/ARES.2015.35.
A. Goldberg, R. Buff, and A. Schmitt, “Comparison of HTTP and HTTPS performance,” in Proc. C. Conf., vol. 1, pp. 226–230, 1998.
R. S. Pressman, Software Engineering: A Practitioner’s Approach, 8th ed. New York, NY, USA: McGraw-Hill, 2014.
K. Cheng, M. Gao, and R. Guo, “Analysis and research on HTTPS hijacking attacks,” in Proc. 2nd Int. Conf. Networks Security, Wireless Communications and Trusted Computing (NSWCTC), vol. 2, 2010, pp. 223–226, doi: https://doi.org/10.1109/NSWCTC.2010.187.
P. K. Janbandhu, “Implementing HTTPS for securing web servers,” 2019, doi: https://doi.org/10.13140/RG.2.2.26172.39042/1.
J. Müthing, T. Jäschke, and C. M. Friedrich, “Client-focused security assessment of mHealth apps and recommended practices to prevent or mitigate transport security issues,” JMIR mHealth and uHealth, vol. 5, no. 10, 2017, doi: https://doi.org/10.2196/mhealth.7791.
M. C. Tran, M. H. Nguyen, and T. Q. Nguyen, “An application for monitoring and analysis of HTTP communications,” Journal of Communications, vol. 13, no. 8, pp. 456–462, 2018, doi: https://doi.org/10.12720/jcm.13.8.456-462.
M. Jørgensen, “Software quality measurement,” Advances in Engineering Software, vol. 30, no. 12, pp. 907–912, 1999, doi: https://doi.org/10.1016/S0965-9978(99)00015-0.
D. Nabil, A. Mosad, and H. A. Hefny, “Web-based applications quality factors: A survey and a proposed conceptual model,” Egyptian Informatics Journal, vol. 12, no. 3, pp. 211–217, 2011, doi: https://doi.org/10.1016/j.eij.2011.09.003.
B. W. Boehm, “Software engineering—as it is,” in Software Engineering: Barry W. Boehm’s Lifetime Contributions to Software Development, Management, and Research, pp. 663–685, 2007, doi: https://doi.org/10.1109/9780470187562.ch8.
D. Galin, “Software quality factors (attributes),” in Software Quality: Concepts and Practice, pp. 23–44, 2018,doi:https://doi.org/10.1002/9781119134527.ch2.
M. Kassim, M. Ismail, K. Jumari, and M. I. Yusof, “Bandwidth gain analysis for HTTP and HTTPS traffic on IP-based networks,” in IEEE Symp. Wireless Technology and Applications (ISWTA), 2012, pp. 303–308, doi: https://doi.org/10.1109/ISWTA.2012.6373866
S. Dyllan, H. Dahimene, P. Wright, and P. Xiao, “Analysis of HTTP and HTTPS usage on the university Internet backbone links,” Journal of Industrial and Intelligent Information, vol. 2, no. 1, pp. 67–70, 2014, doi: https://doi.org/10.12720/jiii.2.1.67-70.
M. Husák, M. Čermák, T. Jirsík, and P. Čeleda, “HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting,” EURASIP Journal on Information Security, vol. 2016, no. 1, pp. 1–14, 2016, doi: https://doi.org/10.1186/s13635-016-0030-7.
D. Naylor et al., “The cost of the ‘S’ in HTTPS,” in Proc. ACM Conf. Emerging Networking Experiments and Technologies (CoNEXT), 2014, pp. 133–139, doi: https://doi.org/10.1145/2674005.2674991.
H. Kolamunna et al., “Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices,” 2016. [Online]. Available: http://arxiv.org/abs/1608.04180
