Skip to main content

Sale until 1 Feb: Up to 30% off selected books.

Createspace Independent Publishing Platform

Fingerprinting Reverse Proxies Using Timing Analysis Of Tcp Flows (Defense)

No reviews yet
Product Code: 9781523674213
ISBN13: 9781523674213
Condition: New
$13.38
Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from external users while still providing services to outside hosts. Another aspect of reverse proxies is that they can be installed remotely by malicious actors onto compromised machines in order to service malicious content while masking where the content is truly hosted. Reverse proxies interact over the HyperText Transfer Protocol (HTTP), which is delivered via the Transmission Control Protocol (TCP). TCP flows provide various details regarding connections between an end host and a server. One such detail is the timestamp of each packet delivery. Concurrent timestamps may be used to calculate round trip times with some scrutiny. Previous work in timing analysis suggests that active HTTP probes to servers can be analyzed at the originating host in order to classify servers as reverse proxies or otherwise. We collect TCP session data from a variety of global vantage points, actively probing a list of servers with a goal of developing an effective classifier to discern whether each server is a reverse proxy or not based on the timing of packet round trip times.

Author: Naval Postgraduate Naval Postgraduate School, Penny Hill Press Inc
Publisher: CreateSpace Independent Publishing Platform
Publication Date: Jan 25, 2016
Number of Pages: 80 pages
Language: English
Binding: Paperback
ISBN-10: 1523674210
ISBN-13: 9781523674213

Fingerprinting Reverse Proxies Using Timing Analysis Of Tcp Flows (Defense)

$13.38
 
Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from external users while still providing services to outside hosts. Another aspect of reverse proxies is that they can be installed remotely by malicious actors onto compromised machines in order to service malicious content while masking where the content is truly hosted. Reverse proxies interact over the HyperText Transfer Protocol (HTTP), which is delivered via the Transmission Control Protocol (TCP). TCP flows provide various details regarding connections between an end host and a server. One such detail is the timestamp of each packet delivery. Concurrent timestamps may be used to calculate round trip times with some scrutiny. Previous work in timing analysis suggests that active HTTP probes to servers can be analyzed at the originating host in order to classify servers as reverse proxies or otherwise. We collect TCP session data from a variety of global vantage points, actively probing a list of servers with a goal of developing an effective classifier to discern whether each server is a reverse proxy or not based on the timing of packet round trip times.

Author: Naval Postgraduate Naval Postgraduate School, Penny Hill Press Inc
Publisher: CreateSpace Independent Publishing Platform
Publication Date: Jan 25, 2016
Number of Pages: 80 pages
Language: English
Binding: Paperback
ISBN-10: 1523674210
ISBN-13: 9781523674213
 

Customer Reviews

This product hasn't received any reviews yet. Be the first to review this product!

Faster Shipping

Delivery in 3-8 days

Easy Returns

14 days returns

Discount upto 30%

Monthly discount on books

Outstanding Customer Service

Support 24 hours a day