Computer Science ›› 2005, Vol. 32 ›› Issue (11): 55-58.

Previous Articles     Next Articles

LI Qiang, LIN Yah, LIU Kun, JU Jiu-Bin (School of Computer Science and Technology, Jilin University, Changehun 130012)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: Usually network attackers conceal their real attacking paths by establishing interactive connections along a series of intermediate hosts (stepping stones)before they attack the final target. We propose a method for detecting stepping stones by actively p

Key words: Traceback, Connection chain, Active delay

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!