Sciweavers

16 search results - page 1 / 4
» Detection of Encrypted Tunnels Across Network Boundaries
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
13 years 10 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
ICNP
2007
IEEE
13 years 10 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
INFOCOM
2007
IEEE
13 years 10 months ago
SmartTunnel: Achieving Reliability in the Internet
Abstract— Reliability is critical to a variety of network applications. Unfortunately, due to lack of QoS support across ISP boundaries, it is difficult to achieve even two 9s (...
Yi Li, Yin Zhang, Lili Qiu, Simon S. Lam
ICC
2007
IEEE
122views Communications» more  ICC 2007»
13 years 10 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
CNSR
2009
IEEE
102views Communications» more  CNSR 2009»
13 years 8 months ago
Online Classification of Network Flows
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani