{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:23:25Z","timestamp":1743071005875,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030995867"},{"type":"electronic","value":"9783030995874"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99587-4_43","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"516-527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption"],"prefix":"10.1007","author":[{"given":"Noah","family":"Neundorfer","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Lixin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"43_CR1","unstructured":"Zhang, Y., Paxson, V.: Detecting stepping-stones. In: Proceedings\u00a0of the 9th USENIX Security Symposium, Denver, CO, pp. 67\u201381 (2000)"},{"key":"43_CR2","unstructured":"Staniford-Chen, S., Heberlein, L.T.: Holding intruders accountable on the internet. In: Proceedings\u00a0of the IEEE Symposium on Security and Privacy, Oakland, CA, pp. 39\u201349 (1995)"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/10722599_12","volume-title":"Computer Security - ESORICS 2000","author":"K Yoda","year":"2000","unstructured":"Yoda, K., Etoh, H.: Finding a connection chain for tracing intruders. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 191\u2013205. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10722599_12"},{"key":"43_CR4","doi-asserted-by":"publisher","unstructured":"Donoho, D.L., Flesia, A.G., Shankar, U., Paxson, V., Coit, J., Staniford, S.: Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 17\u201335. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36084-0_2","DOI":"10.1007\/3-540-36084-0_2"},{"key":"43_CR5","doi-asserted-by":"publisher","unstructured":"Blum, A., Song, D., Venkataraman, S.: Detection of interactive stepping stones: algorithms and confidence bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 258\u2013277. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30143-1_14","DOI":"10.1007\/978-3-540-30143-1_14"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Yang, J., Zhang, Y.: RTT-based random walk approach to detect stepping-stone intrusion. In: IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 558\u2013563 (2015)","DOI":"10.1109\/AINA.2015.236"},{"key":"43_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.iot.2018.08.011","volume":"3","author":"J Yang","year":"2018","unstructured":"Yang, J., Wang, L., Lesh, A., Lockerbie, B.: Manipulating network traffic to evade stepping-stone intrusion detection. Internet Things 3, 34\u201345 (2018). https:\/\/doi.org\/10.1016\/j.iot.2018.08.011","journal-title":"Internet Things"},{"key":"43_CR8","doi-asserted-by":"publisher","unstructured":"Wang, L., Yang, J., Workman, M., Wan, P.-J.: A framework to test resistency of detection algorithms for stepping-stone intrusion on time-jittering manipulation. Wirel. Commun. Mob. Comput., 1\u20138 (2021). https:\/\/doi.org\/10.1155\/2021\/1807509","DOI":"10.1155\/2021\/1807509"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yang, J., Bediga, S., Huang, S.-H.: Resist intruders\u2019 manipulation via context-based TCP\/IP packet matching. In: The Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, pp. 1101\u20131107, April 2010","DOI":"10.1109\/AINA.2010.12"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Yang, J.: Resistance to chaff attack through TCP\/IP packet cross-matching and RTT-based random walk. In: Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, 23\u201325 March 2016, pp. 784\u2013789 (2016)","DOI":"10.1109\/AINA.2016.17"},{"key":"43_CR11","doi-asserted-by":"publisher","unstructured":"Clausen, H., Gibson, M.S., Aspinall, D.: Evading stepping-stone detection with enough chaff. In: Kuty\u0142owski, M., Zhang, J., Chen, C. (eds.) NSS 2020. LNCS, vol. 12570, pp. 431\u2013446. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65745-1_26","DOI":"10.1007\/978-3-030-65745-1_26"},{"key":"43_CR12","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-030-75075-6_43","volume-title":"Advanced Information Networking and Applications","author":"J Yang","year":"2021","unstructured":"Yang, J., Wang, L., Shakya, S., Workman, M.: Identify encrypted packets to detect stepping-stone intrusion. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 226, pp. 536\u2013547. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75075-6_43"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Yang, J., Lee, B., Huang, S.S.-H.: Monitoring network traffic to detect stepping-stone intrusion. In: The Proceedings of 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2008), Okinawa, Japan, pp. 56\u201361, March 2008","DOI":"10.1109\/WAINA.2008.30"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99587-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:01:39Z","timestamp":1648620099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99587-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030995867","9783030995874"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99587-4_43","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}