Foiling an Attack - Defeating IPSec Tunnel Fingerprinting (original) (raw)

IPSEC: Analysis of Internet Protocol Security

IJSR in Network Security and Communication (IJSRNSC)

View PDFchevron_right

Uncovering identities: A study into VPN tunnel fingerprinting

Vafa Izadinia

Computers & Security, 2006

View PDFchevron_right

IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution

S. Felix Wu

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Modeling and Verification of IPSec and VPN Security Policies

Ehab Al-Shaer

2005

View PDFchevron_right

Authentication and Confidentiality via IPsec

Joshua Guttman

Lecture Notes in Computer Science, 2000

View PDFchevron_right

IPsec/VPN security policy correctness and assurance

Yan Martel

Journal of High Speed Networks, 2006

View PDFchevron_right

Vulnerabilities of VPN using IPSec and Defensive Measures

Byeong Ho Kang

View PDFchevron_right

Automatic Generation of Conflict-Free IPsec Policies

Chin-Laung Lei

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Imperatives and Issues of IPSEC based VPN

hariono lee

View PDFchevron_right

Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol

Nacira Ghoualmi

2013 World Congress on Computer and Information Technology (WCCIT), 2013

View PDFchevron_right

Security architecture for the internet protocol

Seo Seo

1998

View PDFchevron_right

Enabling Practical IPsec Authentication for the Internet

Mario Muñoz-Organero

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Secure IPsec VPN Tunnel Establishment Using IKE-Version 2

Patricia Ghann, Dean of Students' Affairs Koforidua Technical University

Research Square (Research Square), 2022

View PDFchevron_right

Implementing IPsec

Jonathan Smith

View PDFchevron_right

Traffic Flow Confidentiality in IPsec: Protocol and Implementation

Emanuele Delzeri

2008

View PDFchevron_right

Experiences with Host-to-Host IPsec

Anish Mohammed

2005

View PDFchevron_right

Automatic Generation of IPSec/VPN Security Policies In an Intra-Domain Environment

Shyhtsun Wu

Operations & Management : 12th International Workshop on Distributed Systems, DSOM 2001, Nancy, France, October 15-17, 2001: Proceedings, 2001

View PDFchevron_right

A security architecture for the Internet Protocol

Amir Herzberg

Ibm Systems Journal, 1998

View PDFchevron_right

Internet Protocol Security for Secure Communication: Fundamentals, Services and Application

Ruaa Al-Falluji

View PDFchevron_right

Security protocols: 13th international workshop, Cambridge, UK, April 20-22, 2005: revised selected papers

Bruno Crispo

2007

View PDFchevron_right

Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework

Anas Abou El Kalam

2009 3rd International Conference on New Technologies, Mobility and Security, 2009

View PDFchevron_right

BANDS: An Inter-Domain Internet Security Policy Management System for IPSec/VPN

S. Felix Wu

Integrated Network Management VIII, 2003

View PDFchevron_right

Retrofitting Security into Network Protocols: The Case of DNSSEC

Amir Herzberg

IEEE Internet Computing, 2000

View PDFchevron_right

Design and Implementation of IPsec VPN’s and its Configuration on ISP Network

Ijesrt Journal

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY, 2014

View PDFchevron_right

Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers

Bruno Crispo

View PDFchevron_right

A Review on IPsec and SSL VPN

baljot chawla

2015

View PDFchevron_right

Issues with existing Cryptographic Protection Methods for Routing Protocols

Russ White

2006

View PDFchevron_right

Traffic masking in IPsec: architecture and implementation

Renato Lo Cigno

2007 16th IST Mobile and Wireless Communications Summit, 2007

View PDFchevron_right