Data-Driven Attacks Using HTTP Tunneling