vendredi 1 avril 2016

Different types of attacks associated with Glype proxies

Elsevier Network Security : Abusing Glype Proxies

Glype attacks Our paper on "Abusing Glype Proxies: Attacks, Exploits and Defenses" are out in Elsevier Network Security.

Abstract: Proxies play a critical privacy role because these are widely used for anonymous surfing and identity cloaking on the Internet. In addition, proxies also assist in traffic filtering, traffic management, log auditing, access policies and surfing restricted sites. There are several types of proxies available, but the Glype HTTP proxy is used extensively. The Glype open-source HTTP proxy is used extensively. However, proxies can be transformed into attack platforms for exploitation.

- Free Download:
[http://www.slideshare.net/adityaks/abusing-glype-proxies-exploits-and-defences]
- Fetch:
[http://www.sciencedirect.com/science/article/pii/S1353485812701125]

0 commentaires:

Enregistrer un commentaire

Popular Posts

Recent Posts

Pages