Download now Free registration required
Networking is one of the major technological area that faces intrusion threat. Network intruders frequently attack the system and its transmitted packets flowing to and from the user and the server by introducing encrypted malwares. The authors' paper focuses on developing an effective intrusion detection algorithm that identifies the stepping stone through a trace-back policy, despite the perturbation caused by jitter and chaff. It involves tracing back the encrypted stepping stone all the way from the target host to its origin point. Experimental results of their observation show that it is possible to achieve arbitrarily close to 100% true positive rate compared to its earlier work, which was affected by timing perturbations.
- Format: PDF
- Size: 269.44 KB