-
2
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Proc. 5th Int. Symp. Recent Adv. Intrusion Detection, Lecture Notes Comput. Sci. 2516, 2002, pp. 17-35.
-
(2002)
Proc. 5th Int. Symp. Recent Adv. Intrusion Detection, Lecture Notes Comput. Sci
, vol.2516
, pp. 17-35
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
3
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
X. Wang, D. Reeves, S. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proc. 16th Int. Inf. Security Conf., 2001, pp. 369-384.
-
(2001)
Proc. 16th Int. Inf. Security Conf
, pp. 369-384
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
Yuill, J.4
-
5
-
-
84944043513
-
Finding a connection chain for tracing intruders
-
K. Yoda and H. Etoh, "Finding a connection chain for tracing intruders," in Proc. 6th Eur. Symp. Res. Comput. Security, Lecture Notes Comput. Sci. 1895, 2000, pp. 191-205.
-
(2000)
Proc. 6th Eur. Symp. Res. Comput. Security, Lecture Notes Comput. Sci
, vol.1895
, pp. 191-205
-
-
Yoda, K.1
Etoh, H.2
-
6
-
-
84957003012
-
Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
-
X. Wang, D. Reeves, and S. Wu, "Inter-packet delay-based correlation for tracing encrypted connections through stepping stones," in Proc. 7th Eur. Syrup. Research Comput. Security, Lecture Notes Comput. Sci. 2502, 2002, pp. 244-263.
-
(2002)
Proc. 7th Eur. Syrup. Research Comput. Security, Lecture Notes Comput. Sci
, vol.2502
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
-
7
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
-
X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. ACM Conf. Comput. Commun. Security, 2003, pp. 20-29.
-
(2003)
Proc. ACM Conf. Comput. Commun. Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.2
-
8
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proc. Conf. Adv. Intrusion Detection (RAID), 2004, pp. 258-277.
-
(2004)
Proc. Conf. Adv. Intrusion Detection (RAID)
, pp. 258-277
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
9
-
-
85116427392
-
Active timing-based correlation of perturbed traffic flows with chaff packets
-
P. Peng, P. Ning, D. Reeves, and X. Wang, "Active timing-based correlation of perturbed traffic flows with chaff packets," in Proc. 25th IEEE Int. Conf. Distrib. Comput. Syst. Workshops, 2005, pp. 107-113.
-
(2005)
Proc. 25th IEEE Int. Conf. Distrib. Comput. Syst. Workshops
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeves, D.3
Wang, X.4
-
10
-
-
33751045160
-
Detection of stepping stone attack under delay and chaff perturbations
-
presented at the, Phoenix, AZ
-
L. Zhang, A. Persaud, A. Johson, and Y. Guan, "Detection of stepping stone attack under delay and chaff perturbations," presented at the 25th IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), Phoenix, AZ, 2006.
-
(2006)
25th IEEE Int. Perform. Comput. Commun. Conf. (IPCCC)
-
-
Zhang, L.1
Persaud, A.2
Johson, A.3
Guan, Y.4
-
11
-
-
44049098027
-
A signal processing perspective to stepping-stone detection
-
presented at the, Princeton, NJ
-
T. He and L. Tong, "A signal processing perspective to stepping-stone detection," presented at the Conf. Inf. Set. Syst., Princeton, NJ, 2006.
-
(2006)
Conf. Inf. Set. Syst
-
-
He, T.1
Tong, L.2
-
12
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
Sep
-
J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels," IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2455-2477, Sep. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
13
-
-
0029323403
-
Wide-area traffic: The failure ofpoisson modeling
-
Jun
-
V. Paxson and S. Floyd, "Wide-area traffic: The failure ofpoisson modeling," IEEE/ACM Trans. Netw., vol. 3, pp. 226-244, Jun. 1995.
-
(1995)
IEEE/ACM Trans. Netw
, vol.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
14
-
-
2442541375
-
The loop fallacy and serialization in tracing intrusion connections through stepping stones
-
X. Wang, "The loop fallacy and serialization in tracing intrusion connections through stepping stones," in Proc. ACA Symp. Appl. Comput., 2004, pp. 404-411.
-
(2004)
Proc. ACA Symp. Appl. Comput
, pp. 404-411
-
-
Wang, X.1
|