-
1
-
-
84860017701
-
-
NLANR Trace Archive. [Online]
-
NLANR Trace Archive. [Online]. Available: http://pma.nlanr.net/Traces/ long/
-
-
-
-
2
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Sophia Antipolis, France, Sept.
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004), Sophia Antipolis, France, Sept. 2004.
-
(2004)
Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004)
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
3
-
-
18744391788
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Zurich, Switzerland, Oct.
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, Oct. 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
5
-
-
33847129500
-
An integrated architecture for attack attribution
-
BBN REPORT-8384, Dec.
-
W. T. Strayer, C. E. Jones, I. Castineyra, J. B. Levin, and R. R. Hain, "An integrated architecture for attack attribution," BBN Technologies, Tech. Rep. BBN REPORT-8384, Dec. 2003.
-
(2003)
BBN Technologies, Tech. Rep.
-
-
Strayer, W.T.1
Jones, C.E.2
Castineyra, I.3
Levin, J.B.4
Hain, R.R.5
-
7
-
-
2442569400
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
Zurich, Switzerland, Oct.
-
X. Wang, D. S. Reeves, and S. F. Wu, "Inter-packet delay based correlation for tracing encrypted connections through stepping stones," in Proceedings of the 7th European Symposium on Research in Computer Security (ES-ORICS 2002), Zurich, Switzerland, Oct. 2002.
-
(2002)
Proceedings of the 7th European Symposium on Research in Computer Security (ES-ORICS 2002)
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
-
8
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
Paris, France, June
-
X. Wang, D. S. Reeves, S. F. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proceedings of 16th International Conference on Information Security (IFIP/Sec '01), Paris, France, June 2001.
-
(2001)
Proceedings of 16th International Conference on Information Security (IFIP/Sec '01)
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
-
9
-
-
33847167050
-
A testbed for evaluation and analysis of stepping stone attack attribution techniques
-
Barcelona, Spain, Mar.
-
J. Xin, L. Zhang, B. Aswegan, J. Dickerson, J. Dickerson, T. Daniels, and Y. Guan, "A testbed for evaluation and analysis of stepping stone attack attribution techniques," in Proceedings of TridentCom 2006, Barcelona, Spain, Mar. 2006.
-
(2006)
Proceedings of TridentCom 2006
-
-
Xin, J.1
Zhang, L.2
Aswegan, B.3
Dickerson, J.4
Dickerson, J.5
Daniels, T.6
Guan, Y.7
-
11
-
-
85084161090
-
Detecting stepping stones
-
Denver, USA, Aug.
-
Y. Zhang and V. Paxson, "Detecting stepping stones," in Proceedings of the 9th USENIX Security Symposium, Denver, USA, Aug. 2000, pp. 171-184.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 171-184
-
-
Zhang, Y.1
Paxson, V.2
|