{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:34:47Z","timestamp":1768070087904,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540231233","type":"print"},{"value":"9783540301431","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30143-1_14","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T19:59:24Z","timestamp":1284839964000},"page":"258-277","source":"Crossref","is-referenced-by-count":114,"title":["Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds"],"prefix":"10.1007","author":[{"given":"Avrim","family":"Blum","sequence":"first","affiliation":[]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[]},{"given":"Shobha","family":"Venkataraman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Staniford-Chen, S., Heberlein, L.T.: Holding intruders accountable on the internet. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 39\u201349 (1995)","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"14_CR2","unstructured":"Zhang, Y., Paxson, V.: Detecting stepping stones. In: Proceedings of the 9th USENIX Security Symposium, August 2000, pp. 171\u2013184 (2000)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10722599_12","volume-title":"Computer Security - ESORICS 2000","author":"K. Yoda","year":"2000","unstructured":"Yoda, K., Etoh, H.: Finding a connection chain for tracing intruders. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, Springer, Heidelberg (2000)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-36084-0_2","volume-title":"Recent Advances in Intrusion Detection","author":"D. Donoho","year":"2002","unstructured":"Donoho, D., Flesia, A.G., Shankar, U., Paxson, V., Coit, J., Staniford, S.: Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, p. 17. Springer, Heidelberg (2002)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/948109.948115","volume-title":"Proceedings of the 2003 ACM Conference on Computer and Communications Security (CCS 2003)","author":"X. Wang","year":"2003","unstructured":"Wang, X., Reeves, D.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays. In: Proceedings of the 2003 ACM Conference on Computer and Communications Security (CCS 2003), pp. 20\u201329. ACM Press, New York (2003)"},{"key":"14_CR6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3897.001.0001","volume-title":"An Introduction to Computational Learning Theory","author":"M. Kearns","year":"1994","unstructured":"Kearns, M., Vazirani, U.: An Introduction to Computational Learning Theory. MIT Press, Cambridge (1994)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"L. Valiant","year":"1984","unstructured":"Valiant, L.: A theory of the learnable. Communications of the ACM\u00a027, 1134\u20131142 (1984)","journal-title":"Communications of the ACM"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/0020-0190(87)90114-1","volume":"24","author":"A. Blumer","year":"1987","unstructured":"Blumer, A., Ehrenfeucht, A., Haussler, D., Warmuth, M.K.: Occam\u2019s razor. Information Processing Letters\u00a024, 377\u2013380 (1987)","journal-title":"Information Processing Letters"},{"key":"14_CR9","unstructured":"Stoll, C.: The Cuckoo\u2019s Egg: Tracking a Spy through the Maze of Computer Espionage. Pocket Books (2000)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D., Wu, S., Yuill, J.: Sleepy watermark tracing: An active network-based intrusion response framework. In: Proceedings of the 16th International Information Security Conference (IFIP\/Sec 2001), pp. 369\u2013384 (2001)","DOI":"10.1007\/0-306-46998-7_26"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45853-0_15","volume-title":"Computer Security - ESORICS 2002","author":"X. Wang","year":"2002","unstructured":"Wang, X., Reeves, D., Wu, S.: Inter-packet delay-based correlation for tracing encrypted connections through stepping stones. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 244\u2013263. Springer, Heidelberg (2002)"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/967900.967987","volume-title":"Proceedings of the 2004 ACM Symposium on Applied Computing","author":"X. Wang","year":"2004","unstructured":"Wang, X.: The loop fallacy and serialization in tracing intrusion connections through stepping stones. In: Proceedings of the 2004 ACM Symposium on Applied Computing, Nicosia, Cyprus, pp. 404\u2013411. ACM Press, New York (2004)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.392383","volume":"3","author":"V. Paxson","year":"1995","unstructured":"Paxson, V., Floyd, S.: Wide-area traffic: The failure of poisson modeling. IEEE\/ACM Transactions on Networking\u00a03, 226\u2013244 (1995)","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30143-1_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:44:51Z","timestamp":1605743091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30143-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540231233","9783540301431"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30143-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}