摘要 |
One implementation of a method reassembles complete client-server conversati on streams, applies decoders and/or decompressors, and analyzes the resulting data stream using multi-dimensional content profiling and/or weighted keywor d- in-context. The method may detect the extrusion of the data, for example, ev en if the data has been modified from its original form and/or document type. T he decoders may also uncover hidden transport mechanisms such as, for example, e- mail attachments. The method may further detect unauthorized (e.g., rogue) encrypted sessions and stop data transfers deemed malicious. The method allows, for example, for building 2 Gbps (Full-Duplex)-capable extrusion prevention machines.
|