Protocol masking to evade network surveillance

Stanislav Nurilov, Kulesh Shanmugasundaram, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.

Original languageEnglish (US)
Title of host publication2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1467-1472
Number of pages6
ISBN (Print)1424403502, 9781424403509
DOIs
StatePublished - Jan 1 2006
Event2006 40th Annual Conference on Information Sciences and Systems, CISS 2006 - Princeton, NJ, United States
Duration: Mar 22 2006Mar 24 2006

Publication series

Name2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings

Other

Other2006 40th Annual Conference on Information Sciences and Systems, CISS 2006
CountryUnited States
CityPrinceton, NJ
Period3/22/063/24/06

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Nurilov, S., Shanmugasundaram, K., & Memon, N. (2006). Protocol masking to evade network surveillance. In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings (pp. 1467-1472). [4068037] (2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CISS.2006.286696