Papers

Young June Pyun, Young Hee Park, Douglas S. Reeves, Xinyuan Wang, Peng Ning: "Interval-based flow watermarking for tracing interactive traffic", Computer Networks 56(5): 1646-1665 (2012).

Xinyuan Wang, Douglas S. Reeves, "Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking", IEEE Trans. Dependable Sec. Comput. 8(3): 434-449 (2011).

Y.H. Park and D. S. Reeves, "Adaptive Watermarking Against Deliberate Random Delay for Attack Attribution Through Stepping Stones", Proc. of the Ninth International Conference on Information and Communications Security (ICICS 2007) December 2007 [PDF].

Y.J. Pyun and D. S. Reeves, "Deployment of Network Monitors for Attack Attribution", to appear in Proc. of the 4th Intl. Conf. on Broadband Communications, Networks, and Systems (IEEE Broadnets 2007), September 2007 [PDF].

X. Y. Wang, S. Chen, and S. Jajodia, "Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems", in Proc. of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, May 2007 [PDF].

Y. J. Pyun, Y. H. Park, X. Y. Wang, D. S. Reeves, and P. Ning, "Tracing Traffic Through Intermediate Hosts that Repacketize Flows", in Proc. of the 26th Annual IEEE Conf. on Computer Communications (Infocom 2007), May 2007 [PDF].

X. Y. Wang, "The Loop Fallacy and Deterministic Serialization in Tracing Intrusion Connections Through Stepping Stones", in International Journal of Security and Networks, Vol. 1, No. 3/4, 2006 [PDF].

P. Peng, P. Ning, and D. Reeves, "On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques", in Proc of IEEE Symposium on Security and Privacy, Oakland, CA, May 2006 [PDF].

X. Y. Wang, S. Chen, and S. Jajodia, "Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet", in Proc of the 12th ACM Conf. on Computer and Communications Security (CCS 2005), November 2005. [PDF].

P. Peng, P. Ning. D. Reeves, and X. Wang. " Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets". Proc. of the 2nd Workshop on Security in Distributed Computing Systems (SDCS-2005), March 2005. [PDF].

X. Wang. "The Loop Fallacy and Serialization in Tracing Intrusion Connections Through Stepping Stones". Proc. of ACM Symposium on Applied Computing (SAC2004), March 2004. [PDF]

X. Wang and D. S. Reeves. "Robust Correlation of Encrypted Attack Traffic Through
Stepping Stones by Manipulation of Interpacket Delays". Proc. of ACM Conference on Computer and Communications Security (CCS 2003), October 2003. [PDF]

X. Wang, D. S. Reeves and S.F. Wu." Inter-Packet Delay-Based Correlation for Tracing Encrypted Connections through Stepping Stones". In D. Gollmann, G. Karjoth and M. Waidner, editors, Proc. of 7th European Symposium on Research in Computer Security – ESORICS 2000, LNCS #2502, October 2002. [PDF]

X. Wang, D. S. Reeves, and S. F. Wu. "Tracing Based Active Intrusion Response". In Journal of Information Warfare, Vol 1 No 1. [PDF]

X. Wang, D. S. Reeves, S. F. Wu and J. Yuill. "Sleepy Watermark Tracing: An Active Network-
Based Intrusion Response Framework". In Proceedings of 16th International Conference on Information Security (IFIP/Sec’01), June 2001. [PDF]

 

 

 

 
  last updated July 14, 2007 by reeves at eos dot ncsu dot edu