共 7 条
[1]
IDP Series. Juniper. http://kb.juniper.net/InfoCenter/index?p age=content&id=KB7316&cat=IDP_SERIES&actp=LIST . 2010
[2]
Web Tap:Detecting Covert Web Traffic. K.Borders,,A.Prakash. CCS’’04:Proceedings of the11th ACM conference on Computer and Communications Security . 2004
[3]
Detecting http tunnels withstatistical mechanisms. CROTTI M,DUSI M,GRINGOLI F,et al. Proc of the 42nd IEEE International Con-ference on Communications . 2007
[4]
Detecting Encrypted Interactive Stepping-Stone Connection. Ting He,Lang Tong. Tech.Rep.ACSP-TR-01-06-02,CornellUniversity . 2006
[5]
Robust.correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. X.Wang,,D.Reeves. Proc.of the2003ACM Conference on Computer and Communications Security . 2003
[6]
Detection of Interactive Stepping Stones:Algorithms and Confidence Bounds. A.Blum,,D.Song,,S.Venkataraman. Conference of Recent Advance in Intrusion Detection(RAID) . 2004
[7]
Detecting stepping stones. ZHANG Yin,PAXSON V. Proc of the9th USENIX Security Symposium . 2000