Proxy communication string data

作者: Jeff Forristal

DOI:

关键词:

摘要: Systems, methods and apparatus for a distributed security that detects proxied resource requests. The system can identify proxy strings, each of the strings being indicative proper substring in string data constituting communication, communications are generated by processing systems executing plurality applications. be store access to stored provided facilitate detection one or more applications

参考文章(27)
Trevor J. Paskett, James D. Hegge, Brent E. Nixon, System and method for blocking anonymous proxy traffic ,(2006)
John Todd, Sai Sivanesan, David Cann, Network Security Device ,(2007)
Absar Mirza, Sean Baker, Mark Sheppard, Method and system for accessing an object behind a firewall ,(2002)
Khai Gan Chuah, Anonymous page recognition ,(2005)
Jin Sunata, Kotaro Yamaguchi, Makoto Kobayashi, Kenji Maeda, Providing an album to a communication terminal via a network ,(2003)
Trevor J. Paskett, James D. Hegge, Brent E. Nixon, System and method for bridging proxy traffic in an electronic network ,(2008)
Shaohong Wei, Ping Ng, Gang Duan, Zhong Qiang Chen, Systems and methods for content type classification ,(2013)
James Winston Lawwill, Brian L. Pulito, Keith Bryan Knight, Detecting a reverse proxy and establishing a tunneled connection therethrough ,(2003)