Skip to main content

Stealth tracing: Subliminal Traceroute

Buy Article:

$37.12 plus tax (Refund Policy)

The defence against ICT attacks requires detection of probes as early as possible. The earlier an attack is discovered, the more time defenders of systems have to take appropriate counter-measures. This article discusses a stealth tracing technique called Subliminal Traceroute and the development of a software tool that implements this technique. The tool offers detection features, as well as a counter-intelligence feature which tries to pin-point the attacker.
No Reference information available - sign in for access.
No Citation information available - sign in for access.
No Supplementary Data.
No Article Media
No Metrics

Keywords: Data security; Information systems; Systems monitoring; Tracking

Document Type: Research Article

Publication date: 2003-08-01

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more