Login / Signup

Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.

Xinyuan WangDouglas S. Reeves
Published in: CCS (2003)
Keyphrases
  • stepping stones
  • normal traffic
  • network traffic
  • traffic management
  • alert correlation