DocumentCode :
3312351
Title :
Mining TCP packets to detect stepping-stone intrusion (non-reviewed)
Author :
Ni, Long ; Yang, Jianhua ; Song, David Y.
Author_Institution :
NC A & T State Univ., Greensboro
fYear :
2008
fDate :
3-6 April 2008
Firstpage :
260
Lastpage :
260
Abstract :
There have been many approaches proposed to detect stepping-stone Intrusion. Besides having the problem of being vulnerable to intruder´s time and chaff perturbation, those approaches have high false alarm because they predict an intrusion based on detecting stepping-stone. Being a stepping-stone does not necessarily mean an intrusion because some applications using stepping-stones are legitimate. One better way to detect stepping-stone intrusion is to estimate the length of a connection chain from a host where our monitor program resides to the victim site. This length is measured in connections. Based on our observation, we found that even though some applications (users) need to use stepping-stone, but it is highly suspicious to access a host via more than three computers. The problem of detecting stepping-stone intrusion is reduced to estimating the length of an interactive session; this length is called downstream length from the monitoring host. In this paper, we propose an algorithm to estimate the downstream length by a clustering method.
Keywords :
computer networks; telecommunication security; transport protocols; TCP packet mining; clustering method; downstream length estimation; stepping stone intrusion detection; Application software; Clustering algorithms; Clustering methods; Computer science; Computerized monitoring; Educational institutions; Hydrogen; Length measurement; Partitioning algorithms; Remote monitoring;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Southeastcon, 2008. IEEE
Conference_Location :
Huntsville, AL
Print_ISBN :
978-1-4244-1883-1
Electronic_ISBN :
978-1-4244-1884-8
Type :
conf
DOI :
10.1109/SECON.2008.4494298
Filename :
4494298
Link To Document :
بازگشت