메뉴 건너뛰기




Volumn 1, Issue 3-4, 2006, Pages 184-197

The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones

Author keywords

correlation; intrusion tracing; serialisation; stepping stones

Indexed keywords


EID: 77955716028     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.011778     Document Type: Article
Times cited : (13)

References (21)
  • 4
    • 0002461674 scopus 로고
    • Caller identification system in the internet environment
    • et al
    • Jung, H., et al. (1993) ‘Caller identification system in the internet environment’, Proceedings of the Fourth USENIX Security Symposium, pp.69–78.
    • (1993) Proceedings of the Fourth USENIX Security Symposium , pp. 69-78
    • Jung, H.1
  • 6
    • 3543126644 scopus 로고    scopus 로고
    • Large scale IP traceback in high-speed internet: practical techniques and theoretical foundation
    • IEEE
    • Li, J., Sung, J., Xu, J. and Li, L. (2004) ‘Large scale IP traceback in high-speed internet: practical techniques and theoretical foundation’, Proceedings of the 2004 IEEE Symposium on Security and Privacy, IEEE, pp.115–129.
    • (2004) Proceedings of the 2004 IEEE Symposium on Security and Privacy , pp. 115-129
    • Li, J.1    Sung, J.2    Xu, J.3    Li, L.4
  • 9
    • 0002473030 scopus 로고    scopus 로고
    • DIDS (Distributed intrusion detection system) - motivation, architecture and early prototype
    • et al
    • Snapp, S., et al. (2001) ‘DIDS (Distributed intrusion detection system) - motivation, architecture and early prototype’, Proceedings of the 14th National Computer Security Conference, pp.167–176.
    • (2001) Proceedings of the 14th National Computer Security Conference , pp. 167-176
    • Snapp, S.1
  • 10
    • 0034775309 scopus 로고    scopus 로고
    • Hash-based IP traceback
    • et al. ACM
    • Snoeren, A., et al. (2001) ‘Hash-based IP traceback’, Proceedings of ACM SIGCOMM 2001, ACM, September, pp.3–14.
    • (2001) Proceedings of ACM SIGCOMM 2001 , vol.September , pp. 3-14
    • Snoeren, A.1
  • 15
    • 84957003012 scopus 로고    scopus 로고
    • Inter-packet delay based correlation for tracing encrypted connections through stepping stones
    • D. Gollmann, G. Karjoth and M. Waidner, (Eds)
    • Wang, X., Reeves, D.S. and Wu, S.F. (2002) ‘Inter-packet delay based correlation for tracing encrypted connections through stepping stones’, D. Gollmann, G. Karjoth and M. Waidner, (Eds). Seventh European Symposium on Research in Computer Security (ESORICS’2002) LNCS-2502, October, pp.244–263.
    • (2002) Seventh European Symposium on Research in Computer Security (ESORICS’2002) LNCS-2502 , vol.October , pp. 244-263
    • Wang, X.1    Reeves, D.S.2    Wu, S.F.3
  • 17
    • 84944043513 scopus 로고    scopus 로고
    • Finding a connection chain for tracing intruders
    • F. Guppens, Y. Deswarte, D. Gollmann and M. Waidner, (Eds)
    • Yoda, K. and Etoh, H. (2000) ‘Finding a connection chain for tracing intruders’, F. Guppens, Y. Deswarte, D. Gollmann and M. Waidner, (Eds). Sixth European Symposium on Research in Computer Security (ESORICS’2000) LNCS-1895, October, pp.191–205.
    • (2000) Sixth European Symposium on Research in Computer Security (ESORICS’2000) LNCS-1895 , vol.October , pp. 191-205
    • Yoda, K.1    Etoh, H.2
  • 20
    • 84952960052 scopus 로고    scopus 로고
    • Since we assume we have a perfect correlation solution that gives us all and only those connections in a connection chain
    • Since we assume we have a perfect correlation solution that gives us all and only those connections in a connection chain.
  • 21
    • 84952972611 scopus 로고    scopus 로고
    • We will define subsequence later in the section
    • We will define subsequence later in the section.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.