메뉴 건너뛰기




Volumn 55, Issue 5 I, 2007, Pages 1612-1623

Detecting encrypted stepping-stone connections

Author keywords

Intrusion detection; Network security; Nonparametric detection; Testing on point processes

Indexed keywords

COMPUTER SIMULATION; INTERNET; INTRUSION DETECTION; NETWORK SECURITY; PACKET NETWORKS; PERTURBATION TECHNIQUES; POISSON DISTRIBUTION; TELECOMMUNICATION TRAFFIC;

EID: 34247844336     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2006.890881     Document Type: Article
Times cited : (70)

References (15)
  • 3
    • 84904261405 scopus 로고    scopus 로고
    • Sleepy watermark tracing: An active network-based intrusion response framework
    • X. Wang, D. Reeves, S. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proc. 16th Int. Inf. Security Conf., 2001, pp. 369-384.
    • (2001) Proc. 16th Int. Inf. Security Conf , pp. 369-384
    • Wang, X.1    Reeves, D.2    Wu, S.3    Yuill, J.4
  • 7
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
    • X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. ACM Conf. Comput. Commun. Security, 2003, pp. 20-29.
    • (2003) Proc. ACM Conf. Comput. Commun. Security , pp. 20-29
    • Wang, X.1    Reeves, D.2
  • 11
    • 44049098027 scopus 로고    scopus 로고
    • A signal processing perspective to stepping-stone detection
    • presented at the, Princeton, NJ
    • T. He and L. Tong, "A signal processing perspective to stepping-stone detection," presented at the Conf. Inf. Set. Syst., Princeton, NJ, 2006.
    • (2006) Conf. Inf. Set. Syst
    • He, T.1    Tong, L.2
  • 12
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • Sep
    • J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels," IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2455-2477, Sep. 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 13
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure ofpoisson modeling
    • Jun
    • V. Paxson and S. Floyd, "Wide-area traffic: The failure ofpoisson modeling," IEEE/ACM Trans. Netw., vol. 3, pp. 226-244, Jun. 1995.
    • (1995) IEEE/ACM Trans. Netw , vol.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 14
    • 2442541375 scopus 로고    scopus 로고
    • The loop fallacy and serialization in tracing intrusion connections through stepping stones
    • X. Wang, "The loop fallacy and serialization in tracing intrusion connections through stepping stones," in Proc. ACA Symp. Appl. Comput., 2004, pp. 404-411.
    • (2004) Proc. ACA Symp. Appl. Comput , pp. 404-411
    • Wang, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.