{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:47:42Z","timestamp":1725767262051},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/.2006.1629414","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T20:26:01Z","timestamp":1148588761000},"page":"10 pp.-256","source":"Crossref","is-referenced-by-count":26,"title":["Detection of stepping stone attack under delay and chaff perturbations"],"prefix":"10.1109","author":[{"given":"L.","family":"Zhang","sequence":"first","affiliation":[]},{"given":"A.G.","family":"Persaud","sequence":"additional","affiliation":[]},{"given":"A.","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36084-0_2","article-title":"Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay","author":"donoho","year":"2002","journal-title":"Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30143-1_14","article-title":"Detection of interactive stepping stones: Algorithms and confidence bounds","author":"blum","year":"2004","journal-title":"Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004)"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/10722599_12","article-title":"Finding a connection chain for tracing intruders","author":"yoda","year":"2000","journal-title":"Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000)"},{"year":"0","key":"1"},{"key":"7","article-title":"Inter-packet delay based correlation for tracing encrypted connections through stepping stones","author":"wang","year":"2002","journal-title":"Proceedings of the 7th European Symposium on Research in Computer Security (ES-ORICS 2002)"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/948109.948115","article-title":"Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays","author":"wang","year":"2003","journal-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)"},{"key":"5","article-title":"An integrated architecture for attack attribution","author":"strayer","year":"2003","journal-title":"BBN Technologies Tech Rep"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"9","article-title":"A testbed for evaluation and analysis of stepping stone attack attribution techniques","author":"xin","year":"2006","journal-title":"Proceedings of TridentCom 2006"},{"key":"8","article-title":"Sleepy watermark tracing: An active network-based intrusion response framework","author":"wang","year":"2001","journal-title":"Proceedings of 16th International Conference on Information Security (IFIP\/Sec '01)"},{"key":"11","first-page":"171","article-title":"Detecting stepping stones","author":"zhang","year":"2000","journal-title":"Proceedings of the 9th Usenix Security Symposium"}],"event":{"name":"25th IEEE International Performance, Computing, and Communications Conference","start":{"date-parts":[[2006,4,10]]},"location":"Phoenix, AZ","end":{"date-parts":[[2006,4,12]]}},"container-title":["2006 IEEE International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10845\/34183\/01629414.pdf?arnumber=1629414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T06:02:00Z","timestamp":1497679320000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1629414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/.2006.1629414","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}