Identification of networked tunnelled applications

In protocol tunnelling, one application protocol is encapsulated within another carrier protocol in an unusual way to circumvent firewall policy. Application-layer tunnels are a significant security and resource abuse threat for networks because those applications which are restricted by firewalls s...

Full description

Saved in:
Bibliographic Details
Main Author: Ghulam Mujtaba
Format: Default Thesis
Published: 2011
Subjects:
Online Access:https://hdl.handle.net/2134/8423
Tags: Add Tag
No Tags, Be the first to tag this record!