Detecting Stepping-Stone with Chaff Perturbations
暂无分享,去创建一个
[1] Lang Tong,et al. Detecting Encrypted Stepping-Stone Connections , 2007, IEEE Transactions on Signal Processing.
[2] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[3] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[4] Douglas S. Reeves,et al. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.
[5] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[6] Shou-Hsuan Stephen Huang,et al. Stepping-Stone Detection Via Request-Response Traffic Analysis , 2007, ATC.
[7] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[8] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[9] Hiroaki Etoh,et al. Finding a Connection Chain for Tracing Intruders , 2000, ESORICS.