DocumentCode
3217610
Title
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Author
Yang, Jianhua ; Lee, Byong ; Huang, Stephen S H
Author_Institution
Bennett Coll., Greensboro
fYear
2008
fDate
25-28 March 2008
Firstpage
56
Lastpage
61
Abstract
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed to detect stepping-stone since 1995. One of those approaches proposed by A. Blum detects stepping-stone by checking if the difference between the number of the send packets of an incoming connection and the one of an outgoing connection is bounded. One weakness of this method is in resisting intruders´ evasion, such as chaff perturbation. In this paper, we propose a method based on random walk theory to detect stepping-stone intrusion. Our theoretical analysis shows that the proposed method is more effective than Blum´s approach in terms of resisting intruders´ chaff perturbation.
Keywords
computer networks; random processes; security of data; telecommunication security; chaff perturbation; incoming connection; intruder evasion; network intruders; network traffic monitoring; outgoing connection; random walk theory; send packets; stepping-stone intrusion detection; Application software; Computer networks; Computer science; Computerized monitoring; Cryptography; Educational institutions; Electronic mail; Intrusion detection; TCPIP; Telecommunication traffic; Evasion; Intrusion Detection; Network Traffic; Stepping-Stone Intrusion;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference on
Conference_Location
Okinawa
Print_ISBN
978-0-7695-3096-3
Type
conf
DOI
10.1109/WAINA.2008.30
Filename
4482890
Link To Document