Stepping-stone detection technique for recognizing legitimate and attack connections

A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify...

全面介紹

Saved in:
書目詳細資料
Main Authors: Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam
格式: Conference or Workshop Item
語言:English
出版: 2015
主題:
在線閱讀:http://repo.uum.edu.my/15597/1/PID189.pdf
http://repo.uum.edu.my/15597/
http://www.icoci.cms.net.my/proceedings/2015/TOC.html
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!