-
1
-
-
0029232080
-
Holding intruders accountable on the internet
-
Oakland, CA, pp, May
-
S. Staniford-Chen and L. Heberlein, "Holding intruders accountable on the internet," in Proc. the 1995 IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 39-49, May 1995.
-
(1995)
Proc. the 1995 IEEE Symposium on Security and Privacy
, pp. 39-49
-
-
Staniford-Chen, S.1
Heberlein, L.2
-
2
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
X. Wang, D. Reeves, S. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proc. of the 16th International Information Security Conference, pp. 369-384, 2001.
-
(2001)
Proc. of the 16th International Information Security Conference
, pp. 369-384
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
Yuill, J.4
-
4
-
-
84944043513
-
Finding a connection chain for tracing intruders
-
Toulouse, France, October
-
K. Yoda and H. Etoh, "Finding a connection chain for tracing intruders," in 6th European Symposium on Research in Computer Security, Lecture Notes in Computer Science 1895, (Toulouse, France), October 2000.
-
(2000)
6th European Symposium on Research in Computer Security, Lecture Notes in Computer Science 1895
-
-
Yoda, K.1
Etoh, H.2
-
5
-
-
84957003012
-
Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
-
X. Wang, D. Reeves, and S. Wu, "Inter-packet delay-based correlation for tracing encrypted connections through stepping stones," in 7th European Symposium on Research in Computer Security, Lecture Notes in Computer Science 2502, pp. 244-263, 2002.
-
(2002)
7th European Symposium on Research in Computer Security, Lecture Notes in Computer Science
, vol.2502
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
-
6
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in 5th International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science 2516, 2002.
-
(2002)
5th International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science
, vol.2516
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
7
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
-
X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. of the 2003 ACM Conference on Computer and Communications Security, pp. 20-29, 2003.
-
(2003)
Proc. of the 2003 ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.2
-
8
-
-
33745802064
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
Sophia AntipoHs, French Riviera, France, September
-
A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia AntipoHs, French Riviera, France), September 2004.
-
(2004)
Conference of Recent Advance in Intrusion Detection (RAID)
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
10
-
-
85116427392
-
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
-
Columbus, OH, pp, June
-
P. Peng, P Ning, D. Reeves, and X. Wang, "Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets," in Proc. 25th IEEE International Conference on Distributed Computing Systems Workshops, (Columbus, OH), pp. 107-113, June 2005.
-
(2005)
Proc. 25th IEEE International Conference on Distributed Computing Systems Workshops
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeves, D.3
Wang, X.4
-
11
-
-
33751045160
-
Detection of Stepping Stone Attack under Delay and Chaff Perturbations
-
Phoenix, AZ, April
-
L. Zhang, A. Persaud, A. Johson, and Y Guan, "Detection of Stepping Stone Attack under Delay and Chaff Perturbations," in Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), (Phoenix, AZ), April 2006.
-
(2006)
Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006)
-
-
Zhang, L.1
Persaud, A.2
Johson, A.3
Guan, Y.4
-
12
-
-
35148817720
-
Detecting SteppingStone Traffic in Chaff: Fundamental Limits and Robust Algorithms
-
Tech. Rep. ACSP-TR-06-06-01, Cornell University, June
-
T. He and L. Tong, "Detecting SteppingStone Traffic in Chaff: Fundamental Limits and Robust Algorithms," Tech. Rep. ACSP-TR-06-06-01, Cornell University, June 2006. http://acsp.ece.Cornell.edu/pubR.html.
-
(2006)
-
-
He, T.1
Tong, L.2
|