1. M. Ranum, “Network forensics: Network traffic monitoring,” Network Flight Recorder, Inc., Tech. Rep., 1997.
2. S. Staniford-Chen and L. T. Heberlein, “Holding intruders accountable on the internet,” in Proceedings of IEEE Symposium on Security and Privacy, May 1995, pp. 39–49.
3. Y. Zhang and V. Paxson, “Detecting stepping stones,” in 9th USENIX Security Symposium, Aug 2000, pp. 171–184.
4. A. Almulhem and I. Traore, “Connection-chains: A review and taxonomy,” ECE Department, University of Victoria, Tech. Rep. ECE-05.4, 12 2005.
5. F. Buchholz and C. Shields, “Providing process origin information to aid in network traceback,” in Proceedings of the 2002 USENIX Annual Technical Conference, 2002.