[go: up one dir, main page]

Johnson, 2018 - Google Patents

Domain fronting: making backdoor access look like google requests

Johnson, 2018

View PDF
Document ID
255540056010679631
Author
Johnson A
Publication year

External Links

Snippet

1. Abstract Domain fronting first gained widespread attention in 2017, when it came out that Cozy Bear (ATP 29) had used the technique to send packets out of a network, evading firewalls. The practice was initially developed to circumvent censorship, and has been …
Continue reading at www.cs.tufts.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5825Message adaptation based on network or terminal capabilities

Similar Documents

Publication Publication Date Title
JP7561265B2 (en) ENCRYPTED SNI FILTERING METHOD AND SYSTEM FOR CYBER SECURITY APPLICATIONS - Patent application
US10284526B2 (en) Efficient SSL/TLS proxy
US10652210B2 (en) System and method for redirected firewall discovery in a network environment
US9942204B2 (en) Secure personal server system and method
US20250141854A1 (en) Efficient SSL/TLS Proxy
OConnor et al. PivotWall: SDN-based information flow control
US20220029966A1 (en) Embedded virtual private network
JP2025501717A (en) System and method for controlling internet access using encrypted dns - Patents.com
Zave et al. Patterns and interactions in network security
Dutta et al. Tor—the onion router
KR20250012545A (en) Privacy-preserving filtering of encrypted traffic
CA3027340A1 (en) Secure personal server system and method
Koch et al. Securing http/3 web architecture in the cloud
Johnson Domain fronting: making backdoor access look like google requests
Wang et al. Using web-referral architectures to mitigate denial-of-service threats
Grahn et al. Anonymous communication on the internet
Tiwari et al. Alternative (ab) uses for {HTTP} Alternative Services
Chen et al. Narrowing Down the Secrets of the Internet-A Review of Privacy Leakages and Prevention Methods
Lin et al. DAMUP: Practical and privacy-aware cloud-based DDoS mitigation
US20230370492A1 (en) Identify and block domains used for nxns-based ddos attack
Grimes An Exploration of the Security Gaps Created by Encrypted DNS
Pahlevan Signaling and Policy Enforcement for Cooperative Firewalls
Mansoor et al. An analysis of security systems for electronic information for establishing secure internet
Xu et al. A Review of Privacy Leakages and Prevention
Parmar et al. Compromising cloud security and privacy by dos, ddos, and botnet and their countermeasures