Fig. 2From: A research survey in stepping-stone intrusion detectionModeling of a stepping-stone host. This figure contains host hi with one incoming connection Ci1 and one outgoing connection Ci2; the incoming connection Ci1 has one request (send) stream Si(1) and one response (echo) stream Ei(1), and the outgoing connection Ci2 has one request stream Si(2) and one response stream Ei(2), where the index i represents the host hiBack to article page