Monitoring Network Traffic to Detect Stepping-Stone Intrusion
暂无分享,去创建一个
[1] Shou-Hsuan Stephen Huang,et al. Matching TCP packets and its application to the detection of long connection chains on the Internet , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[2] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[3] Kwong H. Yung. Detecting Long Connection Chains of Interactive Terminal Sessions , 2002, RAID.
[4] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[5] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[6] J. Griffiths. The Theory of Stochastic Processes , 1967 .
[7] Hiroaki Etoh,et al. Finding a Connection Chain for Tracing Intruders , 2000, ESORICS.
[8] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.