No Cover Image

Journal article 280 views

Nonintrusive tracing in the Internet

Alina Olteanu, Yang Xiao, Jing Liu, Thomas M Chen, C. L. Philip Chen, Tom Chen Chen

Security and Communication Networks, Pages: n/a - n/a

Swansea University Author: Tom Chen Chen

Full text not available from this repository: check for access using links below.

Check full text

DOI (Published version): 10.1002/sec.616

Published in: Security and Communication Networks
ISSN: 1939-0114
Published: 2012
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa12572
first_indexed 2013-07-23T12:08:16Z
last_indexed 2018-02-09T04:43:05Z
id cronfa12572
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2013-06-10T09:58:55.0144926</datestamp><bib-version>v2</bib-version><id>12572</id><entry>2013-09-03</entry><title>Nonintrusive tracing in the Internet</title><swanseaauthors><author><sid>e2fc2f7d7a1ae089e052771d90fdc1b2</sid><firstname>Tom Chen</firstname><surname>Chen</surname><name>Tom Chen Chen</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2013-09-03</date><abstract></abstract><type>Journal Article</type><journal>Security and Communication Networks</journal><volume></volume><journalNumber></journalNumber><paginationStart>n/a</paginationStart><paginationEnd>n/a</paginationEnd><publisher/><placeOfPublication/><issnPrint>1939-0114</issnPrint><issnElectronic/><keywords/><publishedDay>31</publishedDay><publishedMonth>12</publishedMonth><publishedYear>2012</publishedYear><publishedDate>2012-12-31</publishedDate><doi>10.1002/sec.616</doi><url/><notes>This paper presents two novel solutions to the notoriously difficult problem of tracking attacks through the Internet that pass through intermediate computers. The first "thumbprinting" method works for unencrypted connections, while the second adds timestamps to work for encrypted connections. Rigor: important properties are verified by mathematical proofs and computer simulations. Impact: an international collaboration with University of Alabama and University of Macau, supported by four U.S. National Science Foundation grants. Results push state of the art in tracing cyber attacks, a fundamental problem of national security of high interest to many governments. Queued for publication.</notes><college>COLLEGE NANME</college><CollegeCode>COLLEGE CODE</CollegeCode><institution>Swansea University</institution><apcterm/><lastEdited>2013-06-10T09:58:55.0144926</lastEdited><Created>2013-09-03T06:34:04.0000000</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Engineering and Applied Sciences - Uncategorised</level></path><authors><author><firstname>Alina</firstname><surname>Olteanu</surname><order>1</order></author><author><firstname>Yang</firstname><surname>Xiao</surname><order>2</order></author><author><firstname>Jing</firstname><surname>Liu</surname><order>3</order></author><author><firstname>Thomas M</firstname><surname>Chen</surname><order>4</order></author><author><firstname>C. L. Philip</firstname><surname>Chen</surname><order>5</order></author><author><firstname>Tom Chen</firstname><surname>Chen</surname><order>6</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2013-06-10T09:58:55.0144926 v2 12572 2013-09-03 Nonintrusive tracing in the Internet e2fc2f7d7a1ae089e052771d90fdc1b2 Tom Chen Chen Tom Chen Chen true false 2013-09-03 Journal Article Security and Communication Networks n/a n/a 1939-0114 31 12 2012 2012-12-31 10.1002/sec.616 This paper presents two novel solutions to the notoriously difficult problem of tracking attacks through the Internet that pass through intermediate computers. The first "thumbprinting" method works for unencrypted connections, while the second adds timestamps to work for encrypted connections. Rigor: important properties are verified by mathematical proofs and computer simulations. Impact: an international collaboration with University of Alabama and University of Macau, supported by four U.S. National Science Foundation grants. Results push state of the art in tracing cyber attacks, a fundamental problem of national security of high interest to many governments. Queued for publication. COLLEGE NANME COLLEGE CODE Swansea University 2013-06-10T09:58:55.0144926 2013-09-03T06:34:04.0000000 Faculty of Science and Engineering School of Engineering and Applied Sciences - Uncategorised Alina Olteanu 1 Yang Xiao 2 Jing Liu 3 Thomas M Chen 4 C. L. Philip Chen 5 Tom Chen Chen 6
title Nonintrusive tracing in the Internet
spellingShingle Nonintrusive tracing in the Internet
Tom Chen Chen
title_short Nonintrusive tracing in the Internet
title_full Nonintrusive tracing in the Internet
title_fullStr Nonintrusive tracing in the Internet
title_full_unstemmed Nonintrusive tracing in the Internet
title_sort Nonintrusive tracing in the Internet
author_id_str_mv e2fc2f7d7a1ae089e052771d90fdc1b2
author_id_fullname_str_mv e2fc2f7d7a1ae089e052771d90fdc1b2_***_Tom Chen Chen
author Tom Chen Chen
author2 Alina Olteanu
Yang Xiao
Jing Liu
Thomas M Chen
C. L. Philip Chen
Tom Chen Chen
format Journal article
container_title Security and Communication Networks
container_start_page n/a
publishDate 2012
institution Swansea University
issn 1939-0114
doi_str_mv 10.1002/sec.616
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Engineering and Applied Sciences - Uncategorised{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Engineering and Applied Sciences - Uncategorised
document_store_str 0
active_str 0
published_date 2012-12-31T06:21:03Z
_version_ 1829535338472669184
score 11.058951