{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:01:20Z","timestamp":1725516080700},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692942"},{"type":"electronic","value":"9783540692959"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69295-9_2","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T06:38:25Z","timestamp":1217486305000},"page":"2-12","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP\/IP Packets Cross-Matching"],"prefix":"10.1007","author":[{"given":"Jianhua","family":"Yang","sequence":"first","affiliation":[]},{"given":"Byong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Zhang, Y., Paxson, V.: Detecting Stepping Stones. In: Proc. of the 9th USENIX Security Symposium, Denver, CO, USA, pp. 171\u2013184 (2000)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36084-0_1","volume-title":"Recent Advances in Intrusion Detection","author":"K.H. Yung","year":"2002","unstructured":"Yung, K.H.: Detecting Long Connecting Chains of Interactive Terminal Sessions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 1\u201316. Springer, Heidelberg (2002)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Staniford-Chen, S., Todd Heberlein, L.: Holding Intruders Accountable on the Internet. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 39\u201349 (1995)","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","first-page":"31","volume-title":"Proc. 6th European Symposium on Research in Computer Security","author":"K. Yoda","year":"2000","unstructured":"Yoda, K., Etoh, H.: Finding Connection Chain for Tracing Intruders. In: LCTES 2000. LNCS, vol.\u00a01985, pp. 31\u201342. Springer, Heidelberg (2000)"},{"key":"2_CR5","unstructured":"Yang, J., Huang, S.: Matching TCP Packets and Its Application to the Detection of Long Connection Chains. In: Proceedings (IEEE) of 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, China, pp. 1005\u20131010 (2005)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Donoho, D.L., et al.: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. In: Proceedings of International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, pp. 45\u201359 (2002)","DOI":"10.1007\/3-540-36084-0_2"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping-Stones: Algorithms and Confidence Bounds. In: Proceedings of International Symposium on Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, France, pp. 20\u201335 (2004)","DOI":"10.1007\/978-3-540-30143-1_14"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Yang, J., Huang, S., Wan, M.: A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. In: Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), Vienna, Austria, vol.\u00a01, pp. 231\u2013236 (2006)","DOI":"10.1109\/AINA.2006.13"},{"key":"2_CR9","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.cose.2006.08.011","volume":"26","author":"J. Yang","year":"2007","unstructured":"Yang, J., Huang, S.: Probabilistic Analysis of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. Journal of Computers and Security, Elsevier Ltd.\u00a026, 137\u2013144 (2007)","journal-title":"Journal of Computers and Security, Elsevier Ltd."}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69295-9_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:33:57Z","timestamp":1620016437000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69295-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692942","9783540692959"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69295-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}