|
Volumn , Issue , 2003, Pages 20-29
|
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
|
Author keywords
Correlation; Intrusion Tracing; Robustness; Stepping Stones
|
Indexed keywords
CORRELATION METHODS;
PACKET NETWORKS;
PERTURBATION TECHNIQUES;
RANDOM PROCESSES;
RELIABILITY;
ROBUSTNESS (CONTROL SYSTEMS);
SECURITY SYSTEMS;
ENCRYPTED ATTACKS;
INTERPACKET DELAYS;
INTRUSION TRACING;
STEPPING STONES;
CRYPTOGRAPHY;
|
EID: 2442556704
PISSN: 15437221
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/948109.948115 Document Type: Conference Paper |
Times cited : (206)
|
References (20)
|