Foiling an Attack - Defeating IPSec Tunnel Fingerprinting (original) (raw)
Related papers
IPSEC: Analysis of Internet Protocol Security
IJSR in Network Security and Communication (IJSRNSC)
Uncovering identities: A study into VPN tunnel fingerprinting
Computers & Security, 2006
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
Lecture Notes in Computer Science, 2001
Modeling and Verification of IPSec and VPN Security Policies
2005
Authentication and Confidentiality via IPsec
Lecture Notes in Computer Science, 2000
IPsec/VPN security policy correctness and assurance
Journal of High Speed Networks, 2006
Vulnerabilities of VPN using IPSec and Defensive Measures
Automatic Generation of Conflict-Free IPsec Policies
Lecture Notes in Computer Science, 2005
Imperatives and Issues of IPSEC based VPN
Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol
2013 World Congress on Computer and Information Technology (WCCIT), 2013
Security architecture for the internet protocol
1998
Enabling Practical IPsec Authentication for the Internet
Lecture Notes in Computer Science, 2006
Secure IPsec VPN Tunnel Establishment Using IKE-Version 2
Patricia Ghann, Dean of Students' Affairs Koforidua Technical University
Research Square (Research Square), 2022
Traffic Flow Confidentiality in IPsec: Protocol and Implementation
2008
Experiences with Host-to-Host IPsec
2005
Automatic Generation of IPSec/VPN Security Policies In an Intra-Domain Environment
Operations & Management : 12th International Workshop on Distributed Systems, DSOM 2001, Nancy, France, October 15-17, 2001: Proceedings, 2001
A security architecture for the Internet Protocol
Ibm Systems Journal, 1998
Internet Protocol Security for Secure Communication: Fundamentals, Services and Application
2007
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
2009 3rd International Conference on New Technologies, Mobility and Security, 2009
BANDS: An Inter-Domain Internet Security Policy Management System for IPSec/VPN
Integrated Network Management VIII, 2003
Retrofitting Security into Network Protocols: The Case of DNSSEC
IEEE Internet Computing, 2000
Design and Implementation of IPsec VPN’s and its Configuration on ISP Network
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY, 2014
2015
Issues with existing Cryptographic Protection Methods for Routing Protocols
2006
Traffic masking in IPsec: architecture and implementation
2007 16th IST Mobile and Wireless Communications Summit, 2007