Protocol masking to evade network surveillance

Stanislav Nurilov, Kulesh Shanmugasundaram, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.

Original languageEnglish (US)
Title of host publication2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
Pages1467-1472
Number of pages6
DOIs
StatePublished - 2007
Event2006 40th Annual Conference on Information Sciences and Systems, CISS 2006 - Princeton, NJ, United States
Duration: Mar 22 2006Mar 24 2006

Other

Other2006 40th Annual Conference on Information Sciences and Systems, CISS 2006
CountryUnited States
CityPrinceton, NJ
Period3/22/063/24/06

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Nurilov, S., Shanmugasundaram, K., & Memon, N. (2007). Protocol masking to evade network surveillance. In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings (pp. 1467-1472). [4068037] https://doi.org/10.1109/CISS.2006.286696

Protocol masking to evade network surveillance. / Nurilov, Stanislav; Shanmugasundaram, Kulesh; Memon, Nasir.

2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. 2007. p. 1467-1472 4068037.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nurilov, S, Shanmugasundaram, K & Memon, N 2007, Protocol masking to evade network surveillance. in 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings., 4068037, pp. 1467-1472, 2006 40th Annual Conference on Information Sciences and Systems, CISS 2006, Princeton, NJ, United States, 3/22/06. https://doi.org/10.1109/CISS.2006.286696
Nurilov S, Shanmugasundaram K, Memon N. Protocol masking to evade network surveillance. In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. 2007. p. 1467-1472. 4068037 https://doi.org/10.1109/CISS.2006.286696
Nurilov, Stanislav ; Shanmugasundaram, Kulesh ; Memon, Nasir. / Protocol masking to evade network surveillance. 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. 2007. pp. 1467-1472
@inproceedings{f5d3db23236649509f124d711e9c37b5,
title = "Protocol masking to evade network surveillance",
abstract = "In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.",
author = "Stanislav Nurilov and Kulesh Shanmugasundaram and Nasir Memon",
year = "2007",
doi = "10.1109/CISS.2006.286696",
language = "English (US)",
isbn = "1424403502",
pages = "1467--1472",
booktitle = "2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings",

}

TY - GEN

T1 - Protocol masking to evade network surveillance

AU - Nurilov, Stanislav

AU - Shanmugasundaram, Kulesh

AU - Memon, Nasir

PY - 2007

Y1 - 2007

N2 - In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.

AB - In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.

UR - http://www.scopus.com/inward/record.url?scp=44049108172&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=44049108172&partnerID=8YFLogxK

U2 - 10.1109/CISS.2006.286696

DO - 10.1109/CISS.2006.286696

M3 - Conference contribution

AN - SCOPUS:44049108172

SN - 1424403502

SN - 9781424403509

SP - 1467

EP - 1472

BT - 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings

ER -