{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:30:00Z","timestamp":1743024600584,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750749"},{"type":"electronic","value":"9783030750756"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75075-6_43","type":"book-chapter","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T07:06:40Z","timestamp":1619420800000},"page":"536-547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Identify Encrypted Packets to Detect Stepping-Stone Intrusion"],"prefix":"10.1007","author":[{"given":"Jianhua","family":"Yang","sequence":"first","affiliation":[]},{"given":"Lixin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Suhev","family":"Shakya","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Workman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"key":"43_CR1","unstructured":"Zhang, Y., Paxson, V.: Detecting stepping-stones. In: Proceedings of the 9th USENIX Security Symposium, Denver, CO, pp. 67\u201381 (2000)"},{"key":"43_CR2","unstructured":"Staniford-Chen, S., Heberlein, L.T.: Holding intruders accountable on the internet. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 39\u201349 (1995)"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Yoda, K., Etoh, H.: Finding connection chain for tracing intruders. In: Proceedings of 6th European Symposium on Research in Computer Security, Toulouse, France, Lecture Notes in Computer Science, vol. 1985, pp. 31\u201342 (2000)","DOI":"10.1007\/10722599_12"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Blum, A., Song, D., Venkataraman, S.: Detection of interactive stepping-stones: algorithms and confidence bounds. In: Proceedings of International Symposium on Recent Advance in Intrusion Detection, Sophia Antipolis, France, pp. 20\u201335 (2004)","DOI":"10.1007\/978-3-540-30143-1_14"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Donoho, D.L.: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, pp. 45\u201359 (2002)","DOI":"10.1007\/3-540-36084-0_2"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D.S., Wu, S.F., Yu, J.: Sleepy watermark tracing: an active network based intrusion response framework. In: Proceedings of the 16th International Conference on Information security, USA, pp. 369\u2013384 (2001)","DOI":"10.1007\/0-306-46998-7_26"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D.S.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, USA, pp. 20\u201329 (2003)","DOI":"10.1145\/948109.948115"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Wang, X.: The loop fallacy and serialization in tracing intrusion connections through stepping stones. In: Proceedings of the 2004 ACM Symposium on Applied Computing, USA, pp. 404\u2013411 (2004)","DOI":"10.1145\/967900.967987"},{"issue":"5","key":"43_CR9","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/TSP.2006.890881","volume":"55","author":"T He","year":"2007","unstructured":"He, T., Tong, L.: Detecting encrypted stepping-stone connections. IEEE Trans. Signal Process. 55(5), 1612\u20131623 (2007)","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"43_CR10","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/0020-0190(90)90035-V","volume":"35","author":"S Wu","year":"1990","unstructured":"Wu, S., Manber, U., Myers, G., Miller, W.: An O(NP) sequence comparison algorithm. Inf. Process. Lett. 35(6), 317\u2013323 (1990)","journal-title":"Inf. Process. Lett."}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75075-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T12:25:58Z","timestamp":1619958358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75075-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750749","9783030750756"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75075-6_43","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}