Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection
暂无分享,去创建一个
[1] Kwong H. Yung. Detecting Long Connection Chains of Interactive Terminal Sessions , 2002, RAID.
[2] Shou-Hsuan Stephen Huang,et al. Mining TCP/IP packets to detect stepping-stone intrusion , 2007, Comput. Secur..
[3] Jianhua Yang,et al. An efficient TCP/IP packet matching algorithm to detect stepping-stone intrusion , 2009 .
[4] David L. Mills,et al. Internet Delay Experiments , 1983, RFC.
[5] Shou-Hsuan Stephen Huang,et al. Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection , 2007, Comput. Secur..
[6] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[7] Shou-Hsuan Stephen Huang,et al. Matching TCP/IP Packets to Detect Stepping-Stone Intrusion , 2006 .