• DocumentCode
    3198562
  • Title

    Matching TCP/IP Packets to Resist Stepping-Stone Intruders´ Evasion

  • Author

    Ni, Lonig ; Yang, Jianihua ; Zhang, Rani ; Song, David Y.

  • Author_Institution
    North Carolina A & T State Univ., Greensboro
  • fYear
    2008
  • fDate
    16-18 March 2008
  • Firstpage
    64
  • Lastpage
    68
  • Abstract
    Most network intruders tend to use stepping-stones to attack or invade other hosts to reduce the risks of being discovered. There have been many approaches proposed to detect stepping-stone since 1995. Among them, the most popular one is the method proposed by Blum, which detects stepping-stone by checking whether the difference between the number of the send packets of an incoming connection and that of an outgoing connection is bounded. One disadvantage of this method lies in the weakness in resisting to intruders´ evasion, such as chaff perturbation. In this paper, we analyze the resistance of packet matching approach to intruders´ evasion. The theoretical analysis shows that packet matching method is more effective than other approaches in terms of resistance to intruders´ chaff perturbation and time jittering evasion.
  • Keywords
    jitter; pattern matching; telecommunication security; transport protocols; TCP/IP packet matching; chaff perturbation; network intruders; stepping-stone detection; stepping-stone intruders evasion; time jittering evasion; Cryptography; Delay; Monitoring; Protocols; Relays; Resists; TCPIP; Tellurium;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    System Theory, 2008. SSST 2008. 40th Southeastern Symposium on
  • Conference_Location
    New Orleans, LA
  • ISSN
    0094-2898
  • Print_ISBN
    978-1-4244-1806-0
  • Electronic_ISBN
    0094-2898
  • Type

    conf

  • DOI
    10.1109/SSST.2008.4480191
  • Filename
    4480191