TY - BOOK AU - Staniford-Chen, S. AU - Heberlein, L. T. PY - 1995 DA - 1995// TI - Holding Intruders Accountable on the Internet ID - Staniford-Chen1995 ER - TY - BOOK AU - Wang, X. AU - Reeves, D. AU - Wu, S. AU - Yuill, J. PY - 2001 DA - 2001// TI - Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework ID - Wang2001 ER - TY - BOOK AU - Zhang, Y. AU - Paxson, V. PY - 2000 DA - 2000// TI - Detecting Stepping-Stones ID - Zhang2000 ER - TY - JOUR AU - He, T. AU - Tong, L. PY - 2007 DA - 2007// TI - Detecting encrypted stepping-stone connections JO - Proceedings of IEEE Transaction on signal processing VL - 55 UR - https://doi.org/10.1109/TSP.2006.890881 DO - 10.1109/TSP.2006.890881 ID - He2007 ER - TY - CHAP AU - Donoho, D. AU - Flesia, A. AU - Shankar, U. AU - Paxson, V. AU - Coit, J. AU - Staniford, S. PY - 2002 DA - 2002// TI - Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay BT - The 5th International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science ID - Donoho2002 ER - TY - JOUR AU - Wu, S. AU - Manber, U. AU - Myers, G. AU - Miller, W. PY - 1990 DA - 1990// TI - An O(NP) sequence comparison algorithm JO - Inf. Process. Lett. VL - 35 UR - https://doi.org/10.1016/0020-0190(90)90035-V DO - 10.1016/0020-0190(90)90035-V ID - Wu1990 ER - TY - BOOK AU - Yoda, K. AU - Etoh, H. PY - 2000 DA - 2000// TI - Finding Connection Chain for Tracing Intruders ID - Yoda2000 ER - TY - JOUR AU - Yang, J. AU - Huang, S. S. -. H. PY - 2007 DA - 2007// TI - Mining TCP/IP packets to detect stepping-stone intrusion JO - Journal of Computers and Security VL - 26 UR - https://doi.org/10.1016/j.cose.2007.07.001 DO - 10.1016/j.cose.2007.07.001 ID - Yang2007 ER - TY - BOOK AU - Yung, K. H. PY - 2002 DA - 2002// TI - Detecting Long Connecting Chains of Interactive Terminal Sessions ID - Yung2002 ER - TY - BOOK AU - Blum, A. AU - Song, D. AU - Venkataraman, S. PY - 2004 DA - 2004// TI - Detection of Interactive Stepping-Stones: Algorithms and Confidence Bounds ID - Blum2004 ER - TY - BOOK AU - Yang, J. AU - Lee, B. AU - Huang, S. S. –. H. PY - 2008 DA - 2008// TI - Monitoring Network Traffic to Detect Stepping-Stone Intrusion ID - Yang2008 ER - TY - BOOK AU - Yang, J. AU - Zhang, Y. PY - 2015 DA - 2015// TI - RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion ID - Yang2015 ER - TY - BOOK AU - Teknomo, K. PY - 2017 DA - 2017// TI - Stochastic Process Tutorial ID - Teknomo2017 ER - TY - BOOK AU - Huang, S. S. –. H. AU - Lychev, R. AU - Yang, J. PY - 2007 DA - 2007// TI - Stepping-Stone Detection via Request-Response Traffic Analysis ID - Huang2007 ER - TY - BOOK AU - He, T. AU - Tong, L. PY - 2006 DA - 2006// TI - Detecting Stepping-Stone Traffic in Chaff: Fundamental Limits and Robust Algorithms ID - He2006 ER - TY - BOOK AU - Ding, W. AU - Hausknecht, M. J. AU - Huang, S. -. H. S. AU - Riggle, Z. PY - 2009 DA - 2009// TI - Detecting Stepping-Stone Intruders with Long Connection Chains UR - https://doi.org/10.1109/IAS.2009.123 DO - 10.1109/IAS.2009.123 ID - Ding2009 ER - TY - STD TI - S. S.-H Huang, H. Zhang, and M. Phay, “Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections ”, the Proceedings of 30th IEEE International Conference on Advanced Information Networking and Applications, Fukuoka, Japan, IEEE proceedings and Digital Library, pp. 1043–1050, 2016 ID - ref17 ER - TY - JOUR AU - Wang, X. AU - Reeves, D. PY - 2011 DA - 2011// TI - Robust correlation of encrypted attack traffic through stepping stones by flow watermarking JO - IEEE Trans Dependable Secure Comput VL - 8 UR - https://doi.org/10.1109/TDSC.2010.35 DO - 10.1109/TDSC.2010.35 ID - Wang2011 ER - TY - CHAP AU - Chen, Y. AU - Wang, S. PY - 2016 DA - 2016// TI - A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropy BT - Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE), WorldComp ID - Chen2016 ER - TY - CHAP AU - Yang, J. AU - Zhang, Y. AU - King, R. AU - Tolbert, T. PY - 2018 DA - 2018// TI - Sniffing and chaffing network traffic in stepping-stone intrusion detection BT - 2018 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA) ID - Yang2018 ER - TY - BOOK AU - Jung, H. T. PY - 1993 DA - 1993// TI - Caller Identification System in the Internet Environment ID - Jung1993 ER - TY - BOOK AU - Yang, J. AU - Huang, S. -. H. S. PY - 2004 DA - 2004// TI - A Real-Time Algorithm to Detect Long Connection Chains of Interactive Terminal Sessions ID - Yang2004 ER - TY - STD TI - S. Snapp et al., “DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype”. In Proc. 14th National Computer Security Conference, 1991 ID - ref23 ER - TY - JOUR AU - Paxson, V. AU - Floyd, S. PY - 1995 DA - 1995// TI - Wide-area traffic: the failure of Poisson modeling JO - IEEE/ACM Trans. Networking VL - 3 UR - https://doi.org/10.1109/90.392383 DO - 10.1109/90.392383 ID - Paxson1995 ER - TY - BOOK AU - Yang, J. AU - Huang, S. –. H. S. PY - 2005 DA - 2005// TI - Matching TCP Packets and Its Application to the Detection of Long Connection Chains ID - Yang2005 ER - TY - BOOK AU - Friedman, M. AU - Kandel, A. PY - 1999 DA - 1999// TI - Introduction to Pattern Recognition: Statistical, Structural, Neural, and Fuzzy Logic Approaches PB - NJ World Scientific Publishing Co. CY - River Edge, London UR - https://doi.org/10.1142/3641 DO - 10.1142/3641 ID - Friedman1999 ER - TY - BOOK AU - Jain, A. AU - Dubes, R. PY - 1988 DA - 1988// TI - Algorithms for Clustering Data PB - Prentice Hall, Inc. CY - Englewood Cliffs ID - Jain1988 ER - TY - BOOK AU - Mirkin, B. PY - 1996 DA - 1996// TI - Mathematical Classification and Clustering PB - Kluwer Academic Publishers CY - Dordrecht UR - https://doi.org/10.1007/978-1-4613-0457-9 DO - 10.1007/978-1-4613-0457-9 ID - Mirkin1996 ER - TY - BOOK AU - Bhattacherjee, D. PY - 2016 DA - 2016// TI - Stepping Stone Detection for Tracing Attack Sources in Software-Defined Networks ID - Bhattacherjee2016 ER - TY - BOOK AU - Phaal, P. AU - Panchen, S. AU - McKee, N. PY - 2001 DA - 2001// TI - InMon Corporation’s sFlow: A method for monitoring traffic in switched and routed networks ID - Phaal2001 ER -