Now showing items 1-1 of 1

    • Evading Existing Stepping Stone Detection Methods Using Buffering 

      Venkateshaiah, Madhu (Computer Science & Engineering, 2007-08-23)
      To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by ...