Abstract | ||
---|---|---|
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its corresponding echoed packets. Each pair of timestamps represents a round trip time (RTT) of a packet. Besides the advantages of efficiency, secrecy, and robustness, RTT-thumbprint has the ability to defeat intruder's random delay and chaff manipulation. An exhaustive and a heuristic algorithm are proposed to correlate RTT-thumbprints. The results showed that the heuristic algorithm performs as good as the exhaustive one but is more efficient |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11534310_47 | ICCNMC |
Keywords | Field | DocType |
stepping-stone intrusion,random delay,chaff manipulation,improved thumbprint,heuristic algorithm,timestamp pair,intrusion detection,round trip time | Mobile computing,Heuristic (computer science),Computer science,Network packet,Computer network,Real-time computing,Robustness (computer science),Timestamp,Artificial intelligence,Retard,Round-trip delay time,Intrusion detection system | Conference |
Volume | ISSN | ISBN |
3619 | 0302-9743 | 3-540-28102-9 |
Citations | PageRank | References |
0 | 0.34 | 5 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jianhua Yang | 1 | 35 | 5.49 |
Shou-hsuan Stephen Huang | 2 | 174 | 59.88 |