An effective and efficient scheme along with a number of related algorithms were presented in this thesis for detecting stepping stones in real Internet environments, even when evasion techniques are used by attackers. A high quantitative comparative experimental analysis on stepping stone detection systems was conducted as well.
Language
eng
Field of Research
080303 Computer System Security
Socio Economic Objective
890299 Computer Software and Services not elsewhere classified
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.