A traffic controller is provided which integrates black-box tests of
unauthorized applications to extract application characteristics from
associated Internet traffic, exploits the networking information learned
by host clients, actively scans and controls hosts on the corporate
network, and dynamically configures a corporate firewall to block traffic
to and from critical application network elements. As a result, the
traffic controller effectively manages unauthorized applications and
their associated traffic in a corporate environment.