Login / Signup

Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting.

Maurizio DusiManuel CrottiFrancesco GringoliLuca Salgarelli
Published in: Comput. Networks (2009)
Keyphrases
  • application layer
  • network layer
  • end to end
  • cross layer
  • physical layer
  • transport layer
  • bandwidth allocation
  • overlay network
  • neural network
  • low complexity
  • ddos attacks