Detecting Intruders Using a Long Connection Chain to Connect to a Host | IEEE Conference Publication | IEEE Xplore