Back to Results
First PageMeta Content
Communications protocol / Secure Shell / Stepping Stones / Computing / Data / Information / Transmission Control Protocol


Detecting Stepping Stones Yin Zhang and Vern Paxson Abstract The problem of detecting stepping stones was first addressed in a ground-breaking paper by Staniford-Chen and
Add to Reading List

Document Date: 2008-01-24 05:45:16


Open Document

File Size: 111,14 KB

Share Result on Facebook

City

Denver / Ithaca / /

Company

AT&T / Lawrence Berkeley National Laboratory / /

Continent

Asia / /

Currency

USD / /

/

Facility

University of California at Berkeley / T Center / International Computer Science Institute / Cornell University / Lawrence Berkeley National Laboratory / University of California / /

IndustryTerm

satellite links / clear-text protocol / Internet attackers / Internet access link / offline algorithm / operational use Internet attackers / large site / Internet Relay Chat / real-time algorithms / resource-intensive algorithms / wide-area Internet traffic / Internet Research / large Internet access traces / Internet traffic / latter site / possible solution / wall utilities / display server / bulk-transfer protocols / airtight algorithms / stone algorithm / particular client software / content-based algorithms / detection algorithm / connection chain / detection algorithms / brute-force algorithm / applicable algorithm / off-line stepping stone detection algorithm / brute-force content matching algorithm / real-time intrusion detection system / /

OperatingSystem

Unix / FreeBSD / Microsoft Windows / /

Organization

University of California / International Computer Science Institute / Computer Science Department / Cornell University / /

ProvinceOrState

New York / Manitoba / California / Colorado / Ontario / /

Technology

resource-intensive algorithms / brute-force content matching algorithm / timing algorithm / Unix / clear-text protocol / detection algorithms / broadly applicable algorithm / bulk-transfer protocols / timing-based algorithms / offline algorithm / content-based algorithm / brute-force algorithm / ASCII / timing-based algorithm / real-time algorithms / stepping stone algorithm / stepping-stone detection algorithm / content-based algorithms / detection algorithm / off-line stepping stone detection algorithm / made using a clear-text protocol / /

SocialTag