TY - GEN
T1 - Protocol masking to evade network surveillance
AU - Nurilov, Stanislav
AU - Shanmugasundaram, Kulesh
AU - Memon, Nasir
PY - 2006
Y1 - 2006
N2 - In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.
AB - In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.
UR - http://www.scopus.com/inward/record.url?scp=44049108172&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=44049108172&partnerID=8YFLogxK
U2 - 10.1109/CISS.2006.286696
DO - 10.1109/CISS.2006.286696
M3 - Conference contribution
AN - SCOPUS:44049108172
SN - 1424403502
SN - 9781424403509
T3 - 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
SP - 1467
EP - 1472
BT - 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2006 40th Annual Conference on Information Sciences and Systems, CISS 2006
Y2 - 22 March 2006 through 24 March 2006
ER -