{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:47:44Z","timestamp":1761662864472},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642128264"},{"type":"electronic","value":"9783642128271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12827-1_13","type":"book-chapter","created":{"date-parts":[[2010,5,5]],"date-time":"2010-05-05T19:15:11Z","timestamp":1273086911000},"page":"172-186","source":"Crossref","is-referenced-by-count":4,"title":["Rate-Based Watermark Traceback: A New Approach"],"prefix":"10.1007","author":[{"given":"Zongbin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jiwu","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Sekar, V., Xie, Y., Maltz, D., Reiter, M., Zhang, H.: Toward a framework for internet forensic analysis. In: Proc. of ACM HotNets-III (2004)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: FIT: fast internet traceback. In: Proceedings IEEE INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a02 (2005)","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Strayer, W., Jones, C., Schwartz, B., Mikkelson, J., Livadas, C., Technol, B., Cambridge, M.: Architecture for multi-stage network attack traceback. In: The IEEE Conference on Local Computer Networks, 2005. 30th Anniversary, p. 8 (2005)","DOI":"10.1109\/LCN.2005.33"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45853-0_15","volume-title":"Computer Security - ESORICS 2002","author":"X. Wang","year":"2002","unstructured":"Wang, X., Reeves, D., Wu, S.: Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 244\u2013263. Springer, Heidelberg (2002)"},{"key":"13_CR5","unstructured":"Wang, X., Chen, S., Sybase, I., Dr, O., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Pyun, Y., Park, Y., Wang, X., Reeves, D., Ning, P.: Tracing traffic through intermediate hosts that repacketize flows. In: IEEE INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp. 634\u2013642 (2007)","DOI":"10.1109\/INFCOM.2007.80"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, L., Persaud, A., Johnson, A., Guan, Y.: Detection of stepping stone attack under delay and chaff perturbations. In: 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006, p. 10 (2006)","DOI":"10.1109\/.2006.1629414"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/948109.948115","volume-title":"Proceedings of the 10th ACM conference on Computer and communications security","author":"X. Wang","year":"2003","unstructured":"Wang, X., Reeves, D.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 20\u201329. ACM, New York (2003)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-36084-0_2","volume-title":"Recent Advances in Intrusion Detection","author":"D. Donoho","year":"2002","unstructured":"Donoho, D., Flesia, A., Shankar, U., Paxson, V., Coit, J., Staniford, S.: Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 17\u201335. Springer, Heidelberg (2002)"},{"key":"13_CR10","unstructured":"Wang, X.: Tracing intruders behind stepping stones. PhD thesis (2004)"},{"key":"13_CR11","unstructured":"Staniford-Chen, S., Heberlein, L.: Holding intruders accountable on the internet. In: 1995 IEEE Symposium on Security and Privacy, Proceedings, pp. 39\u201349 (1995)"},{"key":"13_CR12","unstructured":"Zhang, Y., Paxson, V.: Detecting stepping stones. In: Proceedings of the 9th USENIX Security Symposium, pp. 171\u2013184 (2000)"},{"issue":"5","key":"13_CR13","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/TSP.2006.890881","volume":"55","author":"T. He","year":"2007","unstructured":"He, T., Tong, L.: Detecting encrypted stepping-stone connections. IEEE Transactions on Signal Processing, Part 1\u00a055(5), 1612\u20131623 (2007)","journal-title":"IEEE Transactions on Signal Processing, Part 1"},{"key":"13_CR14","first-page":"21","volume-title":"Proceedings of the 13th conference on USENIX Security Symposium","author":"R. Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th conference on USENIX Security Symposium, vol.\u00a013, p. 21. USENIX Association, Berkeley (2004)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Yu, W., Fu, X., Graham, S., Xuan, D., Zhao, W.: Dsss-based flow marking technique for invisible traceback. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 18\u201332 (2007)","DOI":"10.1109\/SP.2007.14"},{"key":"13_CR16","unstructured":"Peng, P., Ning, P., Reeves, D.: On the secrecy of timing-based active watermarking trace-back techniques"},{"key":"13_CR17","volume-title":"Statistical theory of signal detection","author":"C. Helstrom","year":"1968","unstructured":"Helstrom, C.: Statistical theory of signal detection. Pergamon Press, Oxford (1968)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Dembele, D., Kastner, P.: Fuzzy C-means method for clustering microarray data (2003)","DOI":"10.1093\/bioinformatics\/btg119"}],"container-title":["Lecture Notes in Computer Science","Information Security, Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12827-1_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:57:29Z","timestamp":1606186649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12827-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642128264","9783642128271"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12827-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}