Censor Restrictive government, corporate firewall, etc. Discovery Attacks: Notice unusual-looking Web traffic. monitors Web access for "inappropriate use" watch Web traffic for inappropriate access attempts watch for suspicious looking Web access patterns watch for use of circumvention software watch for suspicious inter-request times Disruptive Attacks: Keep the endpoints from talking. blocks access to certain Web sites attempts to block access to circumvention software (e.g., blocking SSL, disrupting communication, etc.)