{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:32:29Z","timestamp":1725471149057},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540386193"},{"type":"electronic","value":"9783540386223"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839569_46","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T13:21:24Z","timestamp":1159881684000},"page":"477-486","source":"Crossref","is-referenced-by-count":0,"title":["Resistance Analysis to Intruders\u2019 Evasion of a Novel Algorithm to Detect Stepping-Stone"],"prefix":"10.1007","author":[{"given":"Yongzhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chunming","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","unstructured":"Zhang, Y., Paxson, V.: Detecting Stepping-Stones. In: Proceedings of the 9th USENIX Security Symposium, Denver, CO, August 2000, pp. 67\u201381 (2000)"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Staniford-Chen, S., Todd Heberlein, L.: Holding Intruders Accountable on the Internet. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, August 1995, pp. 39\u201349 (1995)","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"46_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/10722599_12","volume-title":"Computer Security - ESORICS 2000","author":"K. Yoda","year":"2000","unstructured":"Yoda, K., Etoh, H.: Finding Connection Chain for Tracing Intruders. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 31\u201342. Springer, Heidelberg (2000)"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D.S.: Robust Correlation of Encrypted Attack Traffic Through Stepping-Stones by Manipulation of Interpacket Delays. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington DC (October 2003)","DOI":"10.1145\/948109.948115"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Peng, P., Ning, P., Reeves, D.S., Wang, X.Y.: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. In: Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS 2005), Columbus OH (June 2005)","DOI":"10.1109\/ICDCSW.2005.30"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Donoho, D.L. (ed.): Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. In: Proceedings of International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, September 2002, pp. 45\u201359 (2002)","DOI":"10.1007\/3-540-36084-0_2"},{"key":"46_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-30143-1_14","volume-title":"Recent Advances in Intrusion Detection","author":"A. Blum","year":"2004","unstructured":"Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping-Stones: Algorithms and Confidence Bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 258\u2013277. Springer, Heidelberg (2004)"},{"key":"46_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36084-0_1","volume-title":"Recent Advances in Intrusion Detection","author":"K.H. Yung","year":"2002","unstructured":"Yung, K.H.: Detecting Long Connecting Chains of Interactive Terminal Sessions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 1\u201316. Springer, Heidelberg (2002)"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Yang, J., Huang, S.-H.S.: A Real-Time Algorithm to Detect Long Connection Chains of Interactive Terminal Sessions. In: Proceedings of 3rd International Conference on Information Security (Infosecu 2004), Shanghai, China, November 2004, pp. 198\u2013203 (2004)","DOI":"10.1145\/1046290.1046331"},{"key":"46_CR10","unstructured":"Yang, J., Huang, S.-H.S.: Matching TCP Packets and Its Application to the Detection of Long Connection Chains. In: Proceedings of 19th IEEE International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, March 2005, pp. 1005\u20131010 (2005)"},{"key":"46_CR11","unstructured":"Yang, J., Huang, S.H.S.: Characterizing and Estimating Network Fluctuation for Detecting Interactive Stepping-Stone Intrusion. In: The proceedings of 3rd International Conference on Communication, Network and Information Security, Phoenix, Arizona, November 2005, pp. 70\u201375 (2005)"},{"key":"46_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11767480_2","volume-title":"Applied Cryptography and Network Security","author":"J. Yang","year":"2006","unstructured":"Yang, J., Zhang, Y.: Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 18\u201332. Springer, Heidelberg (2006)"},{"key":"46_CR13","unstructured":"University of Southern California: Transmission Control Protocol. RFC 793 (September 1981)"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839569_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:15:34Z","timestamp":1619507734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839569_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540386193","9783540386223"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11839569_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}