Sciweavers

653 search results - page 1 / 131
» The stepping stones project
Sort
View
ITICSE
2003
ACM
14 years 3 months ago
The stepping stones project
Hilary Bentley, Jenny Davies, Jo Allan
IEEEIAS
2009
IEEE
14 years 4 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
ESORICS
2002
Springer
14 years 9 months ago
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identit...
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
IJSN
2006
65views more  IJSN 2006»
13 years 9 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang