No Cover Image

Journal article 273 views

Nonintrusive tracing in the Internet

Alina Olteanu, Yang Xiao, Jing Liu, Thomas M Chen, C. L. Philip Chen, Tom Chen Chen

Security and Communication Networks, Pages: n/a - n/a

Swansea University Author: Tom Chen Chen

Full text not available from this repository: check for access using links below.

Check full text

DOI (Published version): 10.1002/sec.616

Published in: Security and Communication Networks
ISSN: 1939-0114
Published: 2012
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa12572
Item Description: This paper presents two novel solutions to the notoriously difficult problem of tracking attacks through the Internet that pass through intermediate computers. The first "thumbprinting" method works for unencrypted connections, while the second adds timestamps to work for encrypted connections. Rigor: important properties are verified by mathematical proofs and computer simulations. Impact: an international collaboration with University of Alabama and University of Macau, supported by four U.S. National Science Foundation grants. Results push state of the art in tracing cyber attacks, a fundamental problem of national security of high interest to many governments. Queued for publication.
College: Faculty of Science and Engineering
Start Page: n/a
End Page: n/a