메뉴 건너뛰기




Volumn 54, Issue 11, 2008, Pages 4925-4945

Detection of information flows

Author keywords

Information flow; Intrusion detection and security; Network flows; Point processes and inference; Timing analysis and timing channels

Indexed keywords

ACOUSTIC NOISE; ALARM SYSTEMS; INTRUSION DETECTION; TIME MEASUREMENT;

EID: 49549085794     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.929944     Document Type: Article
Times cited : (30)

References (26)
  • 1
    • 84958977733 scopus 로고    scopus 로고
    • Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
    • Berlin, Germany: Springer-Verlag
    • D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Lecture Notes in Computer Science 2516. Berlin, Germany: Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2516
    • Donoho, D.1    Flesia, A.2    Shankar, U.3    Paxson, V.4    Coit, J.5    Staniford, S.6
  • 2
    • 45249083605 scopus 로고    scopus 로고
    • Anonymous networking amidst eavesdroppers
    • Special Issue on Information-Thoeretic Security, Jun
    • P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inf. Theory, vol. 54, Special Issue on Information-Thoeretic Security, no. 6, pp. 2770-2784, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2770-2784
    • Venkitasubramaniam, P.1    He, T.2    Tong, L.3
  • 4
    • 84904261405 scopus 로고    scopus 로고
    • Sleepy watermark tracing: An active network-based intrusion response framework
    • X. Wang, D. Reeves, S. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proc. 16th Int. Inf. Security Conf., 2001, pp. 369-384.
    • (2001) Proc. 16th Int. Inf. Security Conf , pp. 369-384
    • Wang, X.1    Reeves, D.2    Wu, S.3    Yuill, J.4
  • 6
    • 84944043513 scopus 로고    scopus 로고
    • Finding a connection chain for tracing intruders
    • Berlin, Germany: Springer-Verlag, Oct
    • K. Yoda and H. Etoh, "Finding a connection chain for tracing intruders," in Lecture Notes in Computer Science 1895. Berlin, Germany: Springer-Verlag, Oct. 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895
    • Yoda, K.1    Etoh, H.2
  • 7
    • 84957003012 scopus 로고    scopus 로고
    • Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
    • Berlin, Germany: Springer-Verlag
    • X. Wang, D. Reeves, and S. Wu, "Inter-packet delay-based correlation for tracing encrypted connections through stepping stones," in Lecture Notes in Computer Science 2502. Berlin, Germany: Springer-Verlag, 2002, pp. 244-263.
    • (2002) Lecture Notes in Computer Science , vol.2502 , pp. 244-263
    • Wang, X.1    Reeves, D.2    Wu, S.3
  • 8
    • 34247844336 scopus 로고    scopus 로고
    • Detecting encrypted stepping-stone connections
    • May
    • T. He and L. Tong, "Detecting encrypted stepping-stone connections," IEEE Trans. Signal Process., vol. 55, no. 5, pp. 1612-1623, May 2007.
    • (2007) IEEE Trans. Signal Process , vol.55 , Issue.5 , pp. 1612-1623
    • He, T.1    Tong, L.2
  • 9
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
    • X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. ACM Conf. Comput. Commun. Security, 2003, pp. 20-29.
    • (2003) Proc. ACM Conf. Comput. Commun. Security , pp. 20-29
    • Wang, X.1    Reeves, D.2
  • 10
    • 35048846490 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • Sophia Antipolis, French Riviera, France, Sep
    • A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proc. Conf. Recent Advance Intrusion Detection, Sophia Antipolis, French Riviera, France, Sep. 2004, pp. 258-277.
    • (2004) Proc. Conf. Recent Advance Intrusion Detection , pp. 258-277
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 13
    • 44049102446 scopus 로고    scopus 로고
    • Detecting information flows: Improving chaff tolerance by joint detection
    • Baltimore, MD, Mar
    • T. He and L. Tong, "Detecting information flows: Improving chaff tolerance by joint detection," in Proc. Conf. Inf. Sci. Syst., Baltimore, MD, Mar. 2007, pp. 51-56.
    • (2007) Proc. Conf. Inf. Sci. Syst , pp. 51-56
    • He, T.1    Tong, L.2
  • 14
    • 49549090679 scopus 로고    scopus 로고
    • T. He and L. Tong, Distributed detection of information flows, IEEE Trans. Inf. Forensics Security, 3, Special Issue on Statistical Methods for Network Security and Forensics, no. 3, pp. 390-403, Sep. 2008.
    • T. He and L. Tong, "Distributed detection of information flows," IEEE Trans. Inf. Forensics Security, vol. 3, Special Issue on Statistical Methods for Network Security and Forensics, no. 3, pp. 390-403, Sep. 2008.
  • 15
    • 55349105640 scopus 로고    scopus 로고
    • Toward an analytical approach to anonymous wireless networking
    • Feb
    • P. Venkitasubramaniam, T. He, L. Tong, and S. Wicker, "Toward an analytical approach to anonymous wireless networking," IEEE Commun. Mag., vol. 46, no. 2, pp. 140-146, Feb. 2008.
    • (2008) IEEE Commun. Mag , vol.46 , Issue.2 , pp. 140-146
    • Venkitasubramaniam, P.1    He, T.2    Tong, L.3    Wicker, S.4
  • 16
    • 33847350601 scopus 로고    scopus 로고
    • Effective probabilistic approach protecting sensor traffic
    • Atlantic City, NJ, Oct
    • X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, "Effective probabilistic approach protecting sensor traffic," in Proc. Military Commun. Conf., Atlantic City, NJ, Oct. 2005, pp. 1-7.
    • (2005) Proc. Military Commun. Conf , pp. 1-7
    • Hong, X.1    Wang, P.2    Kong, J.3    Zheng, Q.4    Liu, J.5
  • 19
    • 35148885145 scopus 로고    scopus 로고
    • Packet scheduling against stepping-stone attacks with chaff
    • Washington, DC, Oct
    • T. He, P. Venkitasubramaniam, and L. Tong, "Packet scheduling against stepping-stone attacks with chaff," in Proc. IEEE Military Commun. Conf., Washington, DC, Oct. 2006, pp. 1-7.
    • (2006) Proc. IEEE Military Commun. Conf , pp. 1-7
    • He, T.1    Venkitasubramaniam, P.2    Tong, L.3
  • 23
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of Poisson modeling
    • Jun
    • V. Paxson and S. Floyd, "Wide-area traffic: The failure of Poisson modeling," IEEE/ACM Trans. Netw., vol. 3, no. 3, pp. 226-244, Jun. 1995.
    • (1995) IEEE/ACM Trans. Netw , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.