Identification of networked tunnelled applications
In protocol tunnelling, one application protocol is encapsulated within another carrier protocol in an unusual way to circumvent firewall policy. Application-layer tunnels are a significant security and resource abuse threat for networks because those applications which are restricted by firewalls s...
Saved in:
| Main Author: | |
|---|---|
| Format: | Default Thesis |
| Published: |
2011
|
| Subjects: | |
| Online Access: | https://hdl.handle.net/2134/8423 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|