Correlating Temporal Thumbprints for Tracing Intruders
暂无分享,去创建一个
[1] Shou-Hsuan Stephen Huang,et al. A real-time algorithm to detect long connection chains of interactive terminal sessions , 2004, InfoSecu '04.
[2] Tatu Ylonen,et al. SSH: secure login connections over the internet , 1996 .
[3] Biswanath Mukherjee,et al. Analysis of an algorithm for distributed recognition and accountability , 1993, CCS '93.
[4] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[5] Hiroaki Etoh,et al. Finding a Connection Chain for Tracing Intruders , 2000, ESORICS.
[6] Kwong H. Yung. Detecting Long Connection Chains of Interactive Terminal Sessions , 2002, RAID.
[7] J. Elliott,et al. Distributed denial of service attacks and the zombie ant effect , 2000 .
[8] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[9] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[10] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[11] Dirk Fox. Computer Emergency Response Team (CERT) , 2002, Datenschutz und Datensicherheit.
[12] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .