Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays

Xinyuan Wang, Douglas S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger, editors, Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003. pages 20-29, ACM, 2003. [doi]

Authors

Xinyuan Wang

This author has not been identified. Look up 'Xinyuan Wang' in Google

Douglas S. Reeves

This author has not been identified. Look up 'Douglas S. Reeves' in Google