Computer Science ›› 2005, Vol. 32 ›› Issue (11): 55-58.
Previous Articles Next Articles
LI Qiang, LIN Yah, LIU Kun, JU Jiu-Bin (School of Computer Science and Technology, Jilin University, Changehun 130012)
Online:
Published:
Abstract: Usually network attackers conceal their real attacking paths by establishing interactive connections along a series of intermediate hosts (stepping stones)before they attack the final target. We propose a method for detecting stepping stones by actively p
Key words: Traceback, Connection chain, Active delay
LI Qiang, LIN Yah, LIU Kun, JU Jiu-Bin (School of Computer Science and Technology, Jilin University, Changehun 130012). [J].Computer Science, 2005, 32(11): 55-58.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2005/V32/I11/55
Cited