Fingerprinting reverse proxies using timing analysis of TCP flows
Approved for public release; distribution is unlimited === Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from extern...
Main Author: | Weant, Matthew S. |
---|---|
Other Authors: | Xie, Geoffrey |
Published: |
Monterey, California: Naval Postgraduate School
2013
|
Online Access: | http://hdl.handle.net/10945/37740 |
Similar Items
-
The Research of TCP Proxy over UMTS
by: Shuen-yuan Li, et al.
Published: (2006) -
Implementation of TCP Splicing for Proxy Servers on Linux Platform
by: Cheng-Sheng Wang, et al.
Published: (2002) -
Inferring the presence of reverse proxies through timing analysis
by: Alexander, Daniel R.
Published: (2015) -
Design and Implementation of ASIC forProxy Server with TCP Splicing
by: Yen-Lin Huang, et al.
Published: (2008) -
Dynamic TCP Proxies: Coping with Mobility and Disadvantaged Hosts in MANETs
by: Schomp, Kyle Graham
Published: (2010)