A Hybrid Stepping-Stone Detection Algorithm to Counter Packet Jittering Evasion

被引:0
|
作者
Huang, Shou-Hsuan Stephen [1 ]
Ding, Wei [1 ]
机构
[1] Univ Houston, Dept Comp Sci, Houston, TX 77204 USA
来源
关键词
network security; intrusion detection; stepping-stone; intrusion evasion; packet jittering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hackers often use a chain of intermediate stepping-stone hosts to hide their identity before launching an attack to a particular target. This type of stepping-stone attack can be detected by applying timing-based correlation algorithms on the connections in and out of a stepping-stone host. However, hackers can add chaff packets or jitter the original packets to decrease the detection rate of these correlation-based algorithms. This paper proposes a novel method to detect intrusions under the influence of packet jittering. We first show how the distribution of the inter-arrival time gaps of a jittered connection differs from connections without jittering. An algorithm was designed to detect jittered stream of packets based on the above model. The impact of the jittering probability model on the detection rate and the impact of distribution parameters on the detection rate are presented. A hybrid method to detect stepping-stone detection is proposed which combines a correlation algorithm and our jittering detection algorithm to achieve a better result. This hybrid algorithm gives a much more robust solution to the stepping-stone detection problem.
引用
收藏
页码:83 / 92
页数:10
相关论文
共 37 条
  • [1] Packet Fluctuation Approach for Stepping-Stone Detection
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 364 - 369
  • [2] Resistance analysis to intruders' evasion of a novel algorithm to detect stepping-stone
    Zhang, Yongzhong
    Yang, Jianhua
    Ye, Chunming
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 477 - 486
  • [3] A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation
    Wang, Lixin
    Yang, Jianhua
    Workman, Michael
    Wan, Peng-Jun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [4] Packet-based algorithms for stepping-stone detection with chaff perturbation
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 436 - 446
  • [5] Stepping-stone detection algorithm based on order preserving mapping
    Kuo, Ying-Wei
    Huang, Shou-Hsuan Stephen
    [J]. 2007 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOLS 1 AND 2, 2007, : 275 - 282
  • [6] Packet scheduling against stepping-stone attacks with chaff
    He, Ting
    Venkitasubramaniam, Parvathinathan
    Tong, Lang
    [J]. MILCOM 2006, VOLS 1-7, 2006, : 3453 - +
  • [7] A research survey in stepping-stone intrusion detection
    Lixin Wang
    Jianhua Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [8] A research survey in stepping-stone intrusion detection
    Wang, Lixin
    Yang, Jianhua
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [9] Evading Stepping-Stone Detection with Enough Chaff
    Clausen, Henry
    Gibson, Michael S.
    Aspinall, David
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 431 - 446
  • [10] A signal processing perspective to stepping-stone detection
    He, Ting
    Tong, Lang
    [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 687 - 692