Skip to Main Content
Article navigation

The defence against ICT attacks requires detection of probes as early as possible. The earlier an attack is discovered, the more time defenders of systems have to take appropriate counter‐measures. This article discusses a stealth tracing technique called Subliminal Traceroute and the development of a software tool that implements this technique. The tool offers detection features, as well as a counter‐intelligence feature which tries to pin‐point the attacker.

You do not currently have access to this content.
Don't already have an account? Register

Purchased this content as a guest? Enter your email address to restore access.

Please enter valid email address.
Email address must be 94 characters or fewer.
Pay-Per-View Access
$41.00
Rental

or Create an Account

Close Modal
Close Modal