- Article
Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone Intrusion
- Jianhua Yang and
- Lixin Wang
In the past three decades, stepping-stone intrusion has become a professional and primary way used by intruders to launch their attacks since they can be protected behind a long TCP connection chain. Many different algorithms have been proposed to de...