Protocol masking to evade network surveillance

Stanislav Nurilov, Kulesh Shanmugasundaram, Nasir Memon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.

    Original languageEnglish (US)
    Title of host publication2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
    Pages1467-1472
    Number of pages6
    DOIs
    StatePublished - 2007
    Event2006 40th Annual Conference on Information Sciences and Systems, CISS 2006 - Princeton, NJ, United States
    Duration: Mar 22 2006Mar 24 2006

    Other

    Other2006 40th Annual Conference on Information Sciences and Systems, CISS 2006
    CountryUnited States
    CityPrinceton, NJ
    Period3/22/063/24/06

    ASJC Scopus subject areas

    • Computer Science(all)

    Cite this

    Nurilov, S., Shanmugasundaram, K., & Memon, N. (2007). Protocol masking to evade network surveillance. In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings (pp. 1467-1472). [4068037] https://doi.org/10.1109/CISS.2006.286696

    Protocol masking to evade network surveillance. / Nurilov, Stanislav; Shanmugasundaram, Kulesh; Memon, Nasir.

    2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. 2007. p. 1467-1472 4068037.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Nurilov, S, Shanmugasundaram, K & Memon, N 2007, Protocol masking to evade network surveillance. in 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings., 4068037, pp. 1467-1472, 2006 40th Annual Conference on Information Sciences and Systems, CISS 2006, Princeton, NJ, United States, 3/22/06. https://doi.org/10.1109/CISS.2006.286696
    Nurilov S, Shanmugasundaram K, Memon N. Protocol masking to evade network surveillance. In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. 2007. p. 1467-1472. 4068037 https://doi.org/10.1109/CISS.2006.286696
    Nurilov, Stanislav ; Shanmugasundaram, Kulesh ; Memon, Nasir. / Protocol masking to evade network surveillance. 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. 2007. pp. 1467-1472
    @inproceedings{f5d3db23236649509f124d711e9c37b5,
    title = "Protocol masking to evade network surveillance",
    abstract = "In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.",
    author = "Stanislav Nurilov and Kulesh Shanmugasundaram and Nasir Memon",
    year = "2007",
    doi = "10.1109/CISS.2006.286696",
    language = "English (US)",
    isbn = "1424403502",
    pages = "1467--1472",
    booktitle = "2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings",

    }

    TY - GEN

    T1 - Protocol masking to evade network surveillance

    AU - Nurilov, Stanislav

    AU - Shanmugasundaram, Kulesh

    AU - Memon, Nasir

    PY - 2007

    Y1 - 2007

    N2 - In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.

    AB - In this paper we present the notion of protocol masking. Protocol masking is the process of transforming a protocol that is not allowed by a use-policy into a protocol that is allowed by the policy in order to evade policy enforcement mechanisms. We present the design and implementation architecture of a tool for protocol masking. The tool can be used to test the efficacy of policy enforcement mechanisms.

    UR - http://www.scopus.com/inward/record.url?scp=44049108172&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=44049108172&partnerID=8YFLogxK

    U2 - 10.1109/CISS.2006.286696

    DO - 10.1109/CISS.2006.286696

    M3 - Conference contribution

    SN - 1424403502

    SN - 9781424403509

    SP - 1467

    EP - 1472

    BT - 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings

    ER -