메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Packet scheduling against stepping-stone attacks with chaff

Author keywords

Network defense; Scheduling; Stepping stone attack

Indexed keywords

CONSTRAINT THEORY; CRYPTOGRAPHY; INTRUSION DETECTION; POISSON DISTRIBUTION; SCHEDULING ALGORITHMS; SIGNAL DETECTION;

EID: 35148885145     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2006.302353     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 7
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
    • X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. of the 2003 ACM Conference on Computer and Communications Security, pp. 20-29, 2003.
    • (2003) Proc. of the 2003 ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.2
  • 8
    • 33745802064 scopus 로고    scopus 로고
    • Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
    • Sophia AntipoHs, French Riviera, France, September
    • A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia AntipoHs, French Riviera, France), September 2004.
    • (2004) Conference of Recent Advance in Intrusion Detection (RAID)
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 12
    • 35148817720 scopus 로고    scopus 로고
    • Detecting SteppingStone Traffic in Chaff: Fundamental Limits and Robust Algorithms
    • Tech. Rep. ACSP-TR-06-06-01, Cornell University, June
    • T. He and L. Tong, "Detecting SteppingStone Traffic in Chaff: Fundamental Limits and Robust Algorithms," Tech. Rep. ACSP-TR-06-06-01, Cornell University, June 2006. http://acsp.ece.Cornell.edu/pubR.html.
    • (2006)
    • He, T.1    Tong, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.