-
1
-
-
35048846490
-
Detection of interactive stepping stones: algorithms and confidence bounds
-
Springer
-
Blum, A., Song, D. and Venkataraman, S. (2004) ‘Detection of interactive stepping stones: algorithms and confidence bounds’, Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004) LNCS-3224, Springer, October pp.258–277.
-
(2004)
Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004) LNCS-3224
, vol.October
, pp. 258-277
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
2
-
-
84958977733
-
Multiscale stepping stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Springer
-
Donoho, D., Flesia, A.G., Shanka, U., Paxson, V., Coit, J. and Staniford, S. (2002) ‘Multiscale stepping stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay’, Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002) LNCS-2516, Springer, October pp.17–35.
-
(2002)
Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002) LNCS-2516
, vol.October
, pp. 17-35
-
-
Donoho, D.1
Flesia, A.G.2
Shanka, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
4
-
-
0002461674
-
Caller identification system in the internet environment
-
et al
-
Jung, H., et al. (1993) ‘Caller identification system in the internet environment’, Proceedings of the Fourth USENIX Security Symposium, pp.69–78.
-
(1993)
Proceedings of the Fourth USENIX Security Symposium
, pp. 69-78
-
-
Jung, H.1
-
5
-
-
27544460278
-
Remote physical device fingerprinting
-
IEEE
-
Kohno, T., Broido, A. and Claffy, K. (2005) ‘Remote physical device fingerprinting’, Proceedings of IEEE Symposium on Security and Privacy, IEEE, pp.211–225.
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
6
-
-
3543126644
-
Large scale IP traceback in high-speed internet: practical techniques and theoretical foundation
-
IEEE
-
Li, J., Sung, J., Xu, J. and Li, L. (2004) ‘Large scale IP traceback in high-speed internet: practical techniques and theoretical foundation’, Proceedings of the 2004 IEEE Symposium on Security and Privacy, IEEE, pp.115–129.
-
(2004)
Proceedings of the 2004 IEEE Symposium on Security and Privacy
, pp. 115-129
-
-
Li, J.1
Sung, J.2
Xu, J.3
Li, L.4
-
8
-
-
0033650584
-
Practical network support for IP traceback
-
ACM
-
Savage, S., Wetherall, D., Karlin, A. and Anderson, T. (2000) ‘Practical network support for IP traceback’, Proceedings of the ACM SIGCOMM 2000, ACM, September pp.295–306.
-
(2000)
Proceedings of the ACM SIGCOMM 2000
, vol.September
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
9
-
-
0002473030
-
DIDS (Distributed intrusion detection system) - motivation, architecture and early prototype
-
et al
-
Snapp, S., et al. (2001) ‘DIDS (Distributed intrusion detection system) - motivation, architecture and early prototype’, Proceedings of the 14th National Computer Security Conference, pp.167–176.
-
(2001)
Proceedings of the 14th National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.1
-
10
-
-
0034775309
-
Hash-based IP traceback
-
et al. ACM
-
Snoeren, A., et al. (2001) ‘Hash-based IP traceback’, Proceedings of ACM SIGCOMM 2001, ACM, September, pp.3–14.
-
(2001)
Proceedings of ACM SIGCOMM 2001
, vol.September
, pp. 3-14
-
-
Snoeren, A.1
-
15
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
D. Gollmann, G. Karjoth and M. Waidner, (Eds)
-
Wang, X., Reeves, D.S. and Wu, S.F. (2002) ‘Inter-packet delay based correlation for tracing encrypted connections through stepping stones’, D. Gollmann, G. Karjoth and M. Waidner, (Eds). Seventh European Symposium on Research in Computer Security (ESORICS’2002) LNCS-2502, October, pp.244–263.
-
(2002)
Seventh European Symposium on Research in Computer Security (ESORICS’2002) LNCS-2502
, vol.October
, pp. 244-263
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
-
16
-
-
84904261405
-
Sleepy watermark tracing: an active network-based intrusion response framework
-
Wang, X., Reeves, D.S., Wu, S.F. and Yuill, J. (2001a) ‘Sleepy watermark tracing: an active network-based intrusion response framework’, Proceedings of 16th International Conference on Information Security (IFIP/Sec’01), June, pp.369–384.
-
(2001)
Proceedings of 16th International Conference on Information Security (IFIP/Sec’01)
, vol.June
, pp. 369-384
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
-
17
-
-
84944043513
-
Finding a connection chain for tracing intruders
-
F. Guppens, Y. Deswarte, D. Gollmann and M. Waidner, (Eds)
-
Yoda, K. and Etoh, H. (2000) ‘Finding a connection chain for tracing intruders’, F. Guppens, Y. Deswarte, D. Gollmann and M. Waidner, (Eds). Sixth European Symposium on Research in Computer Security (ESORICS’2000) LNCS-1895, October, pp.191–205.
-
(2000)
Sixth European Symposium on Research in Computer Security (ESORICS’2000) LNCS-1895
, vol.October
, pp. 191-205
-
-
Yoda, K.1
Etoh, H.2
-
20
-
-
84952960052
-
-
Since we assume we have a perfect correlation solution that gives us all and only those connections in a connection chain
-
Since we assume we have a perfect correlation solution that gives us all and only those connections in a connection chain.
-
-
-
-
21
-
-
84952972611
-
-
We will define subsequence later in the section
-
We will define subsequence later in the section.
-
-
-
|