Fingerprinting reverse proxies using timing analysis of TCP flows
Approved for public release; distribution is unlimited === Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from extern...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California: Naval Postgraduate School
2013
|
Online Access: | http://hdl.handle.net/10945/37740 |