Vis enkel innførsel

dc.contributor.advisorMjølsnes, Stig Frode
dc.contributor.authorKjøglum, Thomas
dc.date.accessioned2015-10-06T10:58:42Z
dc.date.available2015-10-06T10:58:42Z
dc.date.created2015-02-08
dc.date.issued2015
dc.identifierntnudaim:12442
dc.identifier.urihttp://hdl.handle.net/11250/2352716
dc.description.abstractInternet censorship is a problem, where governments and authorities restricts access to what the public can read on the Internet. They use deep packet inspection tools to conduct the censorship. An example of such a tool is Snort. Snort is a signature-based network inspection tool that sits on the edge of a network which is monitored and inspects packets that passes through. To avoid Internet censorship it is possible to bypass the deep inspection tools, and it is multiple ways of doing this. Methods that may be used depends on in which network layer the Internet censorship is done. This is mainly done by changing the traffic appearance too not match the rules written in the signature-based inspection tool. There are multiple software solutions already proposed that are capable of doing this, two of them are Snort and Pluggable Transport. These two solutions are capable to masquerade network traffic to look like benign traffic, and it is not possible to single out the traffic flow from other traffic flow. It is possible to use these two software solutions to transfer malicious code to a company network. This requires that a person inside the company network downloads the malicious code using the software. Malicious code which is downloaded using either Dust or Pluggable Transport software would not be detected, they are designed to look like normal Internet traffic.
dc.languageeng
dc.publisherNTNU
dc.subjectKommunikasjonsteknologi, Informasjonssikkerhet
dc.titleDeep Packet Inspection Bypass
dc.typeMaster thesis
dc.source.pagenumber73


Tilhørende fil(er)

Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel