Journal article 280 views
Nonintrusive tracing in the Internet
Alina Olteanu,
Yang Xiao,
Jing Liu,
Thomas M Chen,
C. L. Philip Chen,
Tom Chen Chen
Security and Communication Networks, Pages: n/a - n/a
Swansea University Author: Tom Chen Chen
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1002/sec.616
Abstract
Nonintrusive tracing in the Internet
Published in: | Security and Communication Networks |
---|---|
ISSN: | 1939-0114 |
Published: |
2012
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa12572 |
first_indexed |
2013-07-23T12:08:16Z |
---|---|
last_indexed |
2018-02-09T04:43:05Z |
id |
cronfa12572 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2013-06-10T09:58:55.0144926</datestamp><bib-version>v2</bib-version><id>12572</id><entry>2013-09-03</entry><title>Nonintrusive tracing in the Internet</title><swanseaauthors><author><sid>e2fc2f7d7a1ae089e052771d90fdc1b2</sid><firstname>Tom Chen</firstname><surname>Chen</surname><name>Tom Chen Chen</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2013-09-03</date><abstract></abstract><type>Journal Article</type><journal>Security and Communication Networks</journal><volume></volume><journalNumber></journalNumber><paginationStart>n/a</paginationStart><paginationEnd>n/a</paginationEnd><publisher/><placeOfPublication/><issnPrint>1939-0114</issnPrint><issnElectronic/><keywords/><publishedDay>31</publishedDay><publishedMonth>12</publishedMonth><publishedYear>2012</publishedYear><publishedDate>2012-12-31</publishedDate><doi>10.1002/sec.616</doi><url/><notes>This paper presents two novel solutions to the notoriously difficult problem of tracking attacks through the Internet that pass through intermediate computers. The first "thumbprinting" method works for unencrypted connections, while the second adds timestamps to work for encrypted connections. Rigor: important properties are verified by mathematical proofs and computer simulations. Impact: an international collaboration with University of Alabama and University of Macau, supported by four U.S. National Science Foundation grants. Results push state of the art in tracing cyber attacks, a fundamental problem of national security of high interest to many governments. Queued for publication.</notes><college>COLLEGE NANME</college><CollegeCode>COLLEGE CODE</CollegeCode><institution>Swansea University</institution><apcterm/><lastEdited>2013-06-10T09:58:55.0144926</lastEdited><Created>2013-09-03T06:34:04.0000000</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Engineering and Applied Sciences - Uncategorised</level></path><authors><author><firstname>Alina</firstname><surname>Olteanu</surname><order>1</order></author><author><firstname>Yang</firstname><surname>Xiao</surname><order>2</order></author><author><firstname>Jing</firstname><surname>Liu</surname><order>3</order></author><author><firstname>Thomas M</firstname><surname>Chen</surname><order>4</order></author><author><firstname>C. L. Philip</firstname><surname>Chen</surname><order>5</order></author><author><firstname>Tom Chen</firstname><surname>Chen</surname><order>6</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2013-06-10T09:58:55.0144926 v2 12572 2013-09-03 Nonintrusive tracing in the Internet e2fc2f7d7a1ae089e052771d90fdc1b2 Tom Chen Chen Tom Chen Chen true false 2013-09-03 Journal Article Security and Communication Networks n/a n/a 1939-0114 31 12 2012 2012-12-31 10.1002/sec.616 This paper presents two novel solutions to the notoriously difficult problem of tracking attacks through the Internet that pass through intermediate computers. The first "thumbprinting" method works for unencrypted connections, while the second adds timestamps to work for encrypted connections. Rigor: important properties are verified by mathematical proofs and computer simulations. Impact: an international collaboration with University of Alabama and University of Macau, supported by four U.S. National Science Foundation grants. Results push state of the art in tracing cyber attacks, a fundamental problem of national security of high interest to many governments. Queued for publication. COLLEGE NANME COLLEGE CODE Swansea University 2013-06-10T09:58:55.0144926 2013-09-03T06:34:04.0000000 Faculty of Science and Engineering School of Engineering and Applied Sciences - Uncategorised Alina Olteanu 1 Yang Xiao 2 Jing Liu 3 Thomas M Chen 4 C. L. Philip Chen 5 Tom Chen Chen 6 |
title |
Nonintrusive tracing in the Internet |
spellingShingle |
Nonintrusive tracing in the Internet Tom Chen Chen |
title_short |
Nonintrusive tracing in the Internet |
title_full |
Nonintrusive tracing in the Internet |
title_fullStr |
Nonintrusive tracing in the Internet |
title_full_unstemmed |
Nonintrusive tracing in the Internet |
title_sort |
Nonintrusive tracing in the Internet |
author_id_str_mv |
e2fc2f7d7a1ae089e052771d90fdc1b2 |
author_id_fullname_str_mv |
e2fc2f7d7a1ae089e052771d90fdc1b2_***_Tom Chen Chen |
author |
Tom Chen Chen |
author2 |
Alina Olteanu Yang Xiao Jing Liu Thomas M Chen C. L. Philip Chen Tom Chen Chen |
format |
Journal article |
container_title |
Security and Communication Networks |
container_start_page |
n/a |
publishDate |
2012 |
institution |
Swansea University |
issn |
1939-0114 |
doi_str_mv |
10.1002/sec.616 |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Engineering and Applied Sciences - Uncategorised{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Engineering and Applied Sciences - Uncategorised |
document_store_str |
0 |
active_str |
0 |
published_date |
2012-12-31T06:21:03Z |
_version_ |
1829535338472669184 |
score |
11.058951 |