DEFENSES

mimicry   Protocol mimicry

Make the proxy traffic look like a known-allowed protocol (HTTP, TLS, QUIC, etc.).

20 PAPERS ON FILE