Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays

Xinyuan Wang, Douglas S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger, editors, Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003. pages 20-29, ACM, 2003. [doi]

Abstract

Abstract is missing.