Title
Detection Of Encrypted Tunnels Across Network Boundaries
Abstract
The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peer-to-peer, chat and e-mail into others allowed by the security policies, such as HTTP, SSH or even DNS, both legitimate and malicious users can effectively neutralize many security restrictions enforced at the network edge. Traditional firewalling techniques, based on Application Layer Gateways and even pattern-matching mechanisms are becoming practically useless as tunneling tools grow more sophisticated.
Year
DOI
Venue
2008
10.1109/ICC.2008.334
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13
Keywords
Field
DocType
local area networks,security policy,pattern matching,traffic classification,cryptography,protocols,fingerprint,information security,fingerprint recognition,tunneling
Traffic classification,Application layer,Computer science,Cryptography,Computer security,Covert,Copying,Computer network,Encryption,Edge device,Security policy
Conference
ISSN
Citations 
PageRank 
1550-3607
15
1.42
References 
Authors
12
4
Name
Order
Citations
PageRank
Maurizio Dusi130318.21
Manuel Crotti224612.62
Francesco Gringoli389061.65
Luca Salgarelli493781.17