2009 International Conference on Advanced Information Networking and Applications 2009
DOI: 10.1109/aina.2009.12
|View full text |Cite
|
Sign up to set email alerts
|

Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Another probability-related distance is the Hellinger distance, which is related to the more well-known Hellinger metric. The Hellinger metric is shown in (24), where P 1 and P 2 are probability distributions over the domain X, p 1 (x) is the probability of x occurring in P 1 , and p 2 (x) is the probability of x occurring in P 2 .…”
Section: B Types Of Measuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Another probability-related distance is the Hellinger distance, which is related to the more well-known Hellinger metric. The Hellinger metric is shown in (24), where P 1 and P 2 are probability distributions over the domain X, p 1 (x) is the probability of x occurring in P 1 , and p 2 (x) is the probability of x occurring in P 2 .…”
Section: B Types Of Measuresmentioning
confidence: 99%
“…Zhao et al [24] use a single distance measure which incorporates one of three correlation coefficients to detect steppingstone attacks, where one computer is used by the attacker to reach another. The authors use the alternative to the Kendall τ rank correlation previously described in ( 29), (31), (33) and (34).…”
Section: B Classificationmentioning
confidence: 99%
“…However, keeping the flow state since a flow's first packet is critical for schemes that rely on the information carried in the first packet or first few packets. Methods for classifying traffic based on application identification (e.g., [4]) and network security schemes (e.g., [5]) are important classes of applications that require information from the first few packets.…”
Section: Introductionmentioning
confidence: 99%