메뉴 건너뛰기




Volumn 2516, Issue , 2002, Pages 17-35

Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay

Author keywords

Evasion; Interactive session; Multiscale methods; Network intrusion detection; Stepping stone; Universal keystroke interarrival distribution; Wavelets

Indexed keywords

MERCURY (METAL);

EID: 84958977733     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36084-0_2     Document Type: Conference Paper
Times cited : (105)

References (11)
  • 4
    • 0003456805 scopus 로고    scopus 로고
    • A Wavelet Tour of Signal Processing
    • Academic Press
    • Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press. Second Edition, 2000.
    • (2000) Second Edition
    • Mallat, S.1
  • 5
    • 0003209406 scopus 로고
    • Wavelets: Algorithms and Applications
    • May
    • Meyer, Y.:Wavelets: Algorithms and Applications. SIAM.May 1993
    • (1993) SIAM
    • Meyer, Y.1
  • 6
    • 84956968040 scopus 로고    scopus 로고
    • The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage
    • October
    • Stoll, C.: The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage. Pocket Books. October 2000
    • (2000) Pocket Books
    • Stoll, C.1
  • 9
    • 0029323403 scopus 로고
    • Wide-Area Traffic: The Failure of Poisson Modeling
    • June
    • Paxson, V. and Floyd, S.: Wide-Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking, Vol. 3(3),June 1995, 226–244
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 10
    • 84969393895 scopus 로고    scopus 로고
    • Wavelab Toolbox for Wavelet Analysis. Requires Matlab. http://www-stat.stanford.edu/wavelab
    • Requires Matlab
  • 11
    • 84944043513 scopus 로고    scopus 로고
    • Finding a Connection Chain for Tracing Intruders
    • Guppens, F.,Deswarte, Y., Gollamann, D. and Waidner, M, Toulouse, France
    • Yoda, K. and Etoh, H.: Finding a Connection Chain for Tracing Intruders, In: Guppens, F.,Deswarte, Y., Gollamann, D. and Waidner, M. (eds): 6th European Symposium on Research in Computer Security - ESORICS 2000 LNCS -1985, Toulouse, France, Oct 2000
    • (2000) 6Th European Symposium on Research in Computer Security - ESORICS 2000 LNCS -1985
    • Yoda, K.1    Etoh, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.