Sciweavers

653 search results - page 2 / 131
» The stepping stones project
Sort
View
CCS
2003
ACM
14 years 4 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ACSAC
2009
IEEE
14 years 5 months ago
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
Abstract—We present an efficient and robust stepping-stone detection scheme based on succinct packet-timing sketches of network flows. The proposed scheme employs an online alg...
Baris Coskun, Nasir D. Memon
ECOOP
2009
Springer
14 years 11 months ago
Stepping Stones over the Refactoring Rubicon
Refactoring tools allow the programmer to pretend they are working with a richer language where the behaviour of a program is automatically preserved during restructuring. In this ...
Mathieu Verbaere, Max Schäfer, Oege de Moor, ...
ATC
2007
Springer
14 years 5 months ago
Stepping-Stone Detection Via Request-Response Traffic Analysis
Abstract. In this paper, we develop an algorithm that may be used as a stepping-stone detection tool. Our approach is based on analyzing correlations between the cumulative number ...
Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Y...
RAID
2004
Springer
14 years 4 months ago
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
Avrim Blum, Dawn Xiaodong Song, Shobha Venkatarama...