-
1
-
-
0029232080
-
Holding intruders accountable on the internet
-
Oakland, CA, pp, May
-
S. Staniford-Chen and L. Heberlein, "Holding intruders accountable on the internet," in Proc. the 1995 IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 39-49, May 1995.
-
(1995)
Proc. the 1995 IEEE Symposium on Security and Privacy
, pp. 39-49
-
-
Staniford-Chen, S.1
Heberlein, L.2
-
2
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
X. Wang, D. Reeves, S. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proc. of the 16th International Information Security Conference, pp. 369-384, 2001.
-
(2001)
Proc. of the 16th International Information Security Conference
, pp. 369-384
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
Yuill, J.4
-
4
-
-
84944043513
-
Finding a connection chain for tracing intruders
-
Toulouse, France, October
-
K. Yoda and H. Etoh, "Finding a connection chain for tracing intruders," in 6th European Symposium on Research in Computer Security, lecture Notes in Computer Science 1895, (Toulouse, France), October 2000.
-
(2000)
6th European Symposium on Research in Computer Security, lecture Notes in Computer Science 1895
-
-
Yoda, K.1
Etoh, H.2
-
5
-
-
84957003012
-
Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
-
7th European Symposium on Research in Computer Security
-
X. Wang, D. Reeves, and S. Wu, "Inter-packet delay-based correlation for tracing encrypted connections through stepping stones," in 7th European Symposium on Research in Computer Security, lecture Notes in Computer Science 2502, pp. 244-263, 2002.
-
(2002)
lecture Notes in Computer Science
, vol.2502
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
-
6
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
5th International Symposium on Recent Advances in Intrusion Detection
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in 5th International Symposium on Recent Advances in Intrusion Detection, lecture Notes in Computer Science 2516, 2002.
-
(2002)
lecture Notes in Computer Science
, vol.2516
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
7
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
-
X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. of the 2003 ACM Conference on Computer and Communications Security, pp. 20-29, 2003.
-
(2003)
Proc. of the 2003 ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.2
-
8
-
-
33745802064
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
Sophia Antipolis, French Riviera, France, September
-
A. Blum, D. Song, and S. Venkataiaman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004.
-
(2004)
Conference of Recent Advance in Intrusion Detection (RAID)
-
-
Blum, A.1
Song, D.2
Venkataiaman, S.3
-
9
-
-
85116427392
-
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
-
Columbus, OH, pp, June
-
P. Peng, P. Ning, D. Reeves, and X. Wang, "Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets," in Proc. 25th IEEE International Conference on Distributed Computing Systems Workshops, (Columbus, OH), pp. 107-113, June 2005.
-
(2005)
Proc. 25th IEEE International Conference on Distributed Computing Systems Workshops
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeves, D.3
Wang, X.4
-
10
-
-
33751045160
-
Detection of Stepping Stone Attack under Delay and Chaff Perturbations
-
Phoenix, AZ, April
-
L. Zhang, A. Persaud, A. Johson, and Y. Guan, "Detection of Stepping Stone Attack under Delay and Chaff Perturbations," in Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), (Phoenix, AZ), April 2006.
-
(2006)
Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006)
-
-
Zhang, L.1
Persaud, A.2
Johson, A.3
Guan, Y.4
-
11
-
-
35148885145
-
Packet scheduling against stepping-stone attacks with chaff
-
Washington,DC, October
-
T. He, P. Venkitasubramaniam, and L. Tong, "Packet scheduling against stepping-stone attacks with chaff," in Proc. IEEE Military Communications Conference, (Washington,DC), October 2006.
-
(2006)
Proc. IEEE Military Communications Conference
-
-
He, T.1
Venkitasubramaniam, P.2
Tong, L.3
-
12
-
-
44049087153
-
Chaff-inserting Algorithms and Robust Detection Algorithms for Information Flows,
-
Tech. Rep. ACSP-TR-02 -07-01, February
-
T. He and L. Tong, "Chaff-inserting Algorithms and Robust Detection Algorithms for Information Flows," Tech. Rep. ACSP-TR-02 -07-01, Cornell University, February 2007. http://acep.ece.Cornell.edu/pubR.html.
-
(2007)
-
-
He, T.1
Tong, L.2
|