Skip to main content
Fig. 2 | EURASIP Journal on Wireless Communications and Networking

Fig. 2

From: A research survey in stepping-stone intrusion detection

Fig. 2

Modeling of a stepping-stone host. This figure contains host hi with one incoming connection Ci1 and one outgoing connection Ci2; the incoming connection Ci1 has one request (send) stream Si(1) and one response (echo) stream Ei(1), and the outgoing connection Ci2 has one request stream Si(2) and one response stream Ei(2), where the index i represents the host hi

Back to article page