Fingerprinting reverse proxies using timing analysis of TCP flows

Approved for public release; distribution is unlimited === Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from extern...

Full description

Bibliographic Details
Main Author: Weant, Matthew S.
Other Authors: Xie, Geoffrey
Published: Monterey, California: Naval Postgraduate School 2013
Online Access:http://hdl.handle.net/10945/37740