Hybrid Stepping Stone Detection Method

被引:0
|
作者
Omar, Mohd Nizam [1 ]
Siregar, Lelyzar [2 ]
Budiarto, Rahmat [2 ]
机构
[1] Univ Utara Malaysia, Dept Informat Technol, Coll Arts & Sci, Kedah 06010, Malaysia
[2] Univ Sains Malaysia, NAv Ctr 6, George Town 11800, Penang, Malaysia
关键词
Intrusion tracing; stepping stone detection; hybrid;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Stepping stone detection can be defined as a process to discover an intermediate host correlation that used by intruder. Most of the intruders cover their track by login into intermediate host first before execute the real attack. This intermediate hosts here known as stepping stone. This paper introduces a hybrid stepping stone detection method which combines the network-based and host-based stepping stone method. By taking the special capabilities of each method, solid stepping stone detection architecture has been produced. A great explanation regarding to the architecture has been done, together with the details of each chosen approach as to develop the overall hybrid stepping stone detection method. The study shows that by applying the hybrid concept in stepping stone detection, benefits can be gained from the less number of false positive and false negative rates, robust against active perturbation and the overall stepping stone methods becomes more precise.
引用
收藏
页码:134 / +
页数:2
相关论文
共 50 条
  • [1] Dropped Packet Problems in Stepping Stone Detection Method
    Omar, Mohd Nizam
    Siregar, Lelyzar
    Budiarto, Rahmat
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 109 - 115
  • [2] A Hybrid Stepping-Stone Detection Algorithm to Counter Packet Jittering Evasion
    Huang, Shou-Hsuan Stephen
    Ding, Wei
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (02): : 83 - 92
  • [3] Evading Stepping-Stone Detection with Enough Chaff
    Clausen, Henry
    Gibson, Michael S.
    Aspinall, David
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 431 - 446
  • [4] A signal processing perspective to stepping-stone detection
    He, Ting
    Tong, Lang
    [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 687 - 692
  • [5] Stepping stone
    Climo, Andrew
    [J]. NEW SCIENTIST, 2013, 217 (2902) : 29 - 29
  • [6] A research survey in stepping-stone intrusion detection
    Wang, Lixin
    Yang, Jianhua
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [7] Packet Fluctuation Approach for Stepping-Stone Detection
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 364 - 369
  • [8] A research survey in stepping-stone intrusion detection
    Lixin Wang
    Jianhua Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [9] 'STEPPING STONE'
    CALLAGHAN, M
    [J]. EXILE, 1979, 6 (1-2): : 216 - 252
  • [10] THE OPTIMIZATION OF STEPPING STONE DETECTION: PACKET CAPTURING STEPS
    Omar, Mohd Nizam
    Maarof, Mohd Aizaini
    Zainal, Anazida
    [J]. JURNAL TEKNOLOGI, 2006, 44