Protocol scrubbing: network security through transparent flow modification | IEEE Conference Publication | IEEE Xplore