메뉴 건너뛰기




Volumn , Issue , 2007, Pages 51-56

Detecting information flows: Improving chaff toleradce by joint detection

Author keywords

Chaff tolerance; Chaff inserting algorithms; Information flow detection

Indexed keywords

CHAFF INSERTING ALGORITHMS; CHAFF TOLERANCE; INFORMATION FLOW DETECTION;

EID: 44049102446     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2007.4298272     Document Type: Conference Paper
Times cited : (13)

References (14)
  • 5
    • 84957003012 scopus 로고    scopus 로고
    • Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
    • 7th European Symposium on Research in Computer Security
    • X. Wang, D. Reeves, and S. Wu, "Inter-packet delay-based correlation for tracing encrypted connections through stepping stones," in 7th European Symposium on Research in Computer Security, lecture Notes in Computer Science 2502, pp. 244-263, 2002.
    • (2002) lecture Notes in Computer Science , vol.2502 , pp. 244-263
    • Wang, X.1    Reeves, D.2    Wu, S.3
  • 6
    • 84958977733 scopus 로고    scopus 로고
    • Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
    • 5th International Symposium on Recent Advances in Intrusion Detection
    • D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in 5th International Symposium on Recent Advances in Intrusion Detection, lecture Notes in Computer Science 2516, 2002.
    • (2002) lecture Notes in Computer Science , vol.2516
    • Donoho, D.1    Flesia, A.2    Shankar, U.3    Paxson, V.4    Coit, J.5    Staniford, S.6
  • 7
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
    • X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. of the 2003 ACM Conference on Computer and Communications Security, pp. 20-29, 2003.
    • (2003) Proc. of the 2003 ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.2
  • 8
    • 33745802064 scopus 로고    scopus 로고
    • Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
    • Sophia Antipolis, French Riviera, France, September
    • A. Blum, D. Song, and S. Venkataiaman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004.
    • (2004) Conference of Recent Advance in Intrusion Detection (RAID)
    • Blum, A.1    Song, D.2    Venkataiaman, S.3
  • 12
    • 44049087153 scopus 로고    scopus 로고
    • Chaff-inserting Algorithms and Robust Detection Algorithms for Information Flows,
    • Tech. Rep. ACSP-TR-02 -07-01, February
    • T. He and L. Tong, "Chaff-inserting Algorithms and Robust Detection Algorithms for Information Flows," Tech. Rep. ACSP-TR-02 -07-01, Cornell University, February 2007. http://acep.ece.Cornell.edu/pubR.html.
    • (2007)
    • He, T.1    Tong, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.