首页> 外文会议>International Conference on Communications >Detection of Encrypted Tunnels Across Network Boundaries
【24h】

Detection of Encrypted Tunnels Across Network Boundaries

机译:跨网络边界检测加密隧道

获取原文

摘要

The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peer- to-peer, chat and e-mail into others allowed by the security policies, such as
机译:近年来,使用隐蔽的应用层隧道绕过安全网关已经变得非常受欢迎。通过封装阻塞或受控协议,例如PEER-to-peer,聊天和电子邮件,进入安全策略允许的其他人,例如

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号