Constructing correlations of perturbed connections under packets loss and disorder

  • Authors:
  • Qiang Li;Qinyuan Feng;Kun Liu;Jiubin Ju

  • Affiliations:
  • Department of Computer Science, JiLin University, ChangChun, JiLin, China;Department of Computer Science, JiLin University, ChangChun, JiLin, China;Department of Computer Science, JiLin University, ChangChun, JiLin, China;Department of Computer Science, JiLin University, ChangChun, JiLin, China

  • Venue:
  • ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the key problems of detecting stepping stones is the construction of connections' correlations. We focus on the use of detecting windows and propose two methods for constructing correlations of perturbed connections. Within the attacker's perturbation range, the first method uses packet-based window and the average value of the packets in the detecting window is set to increase periodically. The method can construct correlations in attacking connection chains by analyzing the increase of the average value of the inter-packet delay between the two connection chains. The second method uses time-based windows. It divides time into segments, forms segments into groups and uses pairs of groups to take the watermarks. These methods can reduce the complexity of correlation computations and improve the efficiency of detecting. The second method can even work under packets loss and disorder.