THE OPTIMIZATION OF STEPPING STONE DETECTION: PACKET CAPTURING STEPS

被引:0
|
作者
Omar, Mohd Nizam [1 ]
Maarof, Mohd Aizaini [1 ]
Zainal, Anazida [1 ]
机构
[1] Univ Teknol Malaysia, Fac Comp Sci & Informat Syst, Skudai 81310, Johor, Malaysia
来源
JURNAL TEKNOLOGI | 2006年 / 44卷
关键词
IDS; IRS; detecting stepping stones; time gap; optimization;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system. The proposed method is to use small size of user buffer and kernel buffer. Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested. Results from the experiment were analyzed. From the result, it is proven that the proposed method (by using small size of buffer) gives better result. The research concludes that by using the proposed method, the response time can be improved.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Dropped Packet Problems in Stepping Stone Detection Method
    Omar, Mohd Nizam
    Siregar, Lelyzar
    Budiarto, Rahmat
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 109 - 115
  • [2] Packet Fluctuation Approach for Stepping-Stone Detection
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 364 - 369
  • [3] Packet-based algorithms for stepping-stone detection with chaff perturbation
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 436 - 446
  • [4] A Hybrid Stepping-Stone Detection Algorithm to Counter Packet Jittering Evasion
    Huang, Shou-Hsuan Stephen
    Ding, Wei
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (02): : 83 - 92
  • [5] Packet scheduling against stepping-stone attacks with chaff
    He, Ting
    Venkitasubramaniam, Parvathinathan
    Tong, Lang
    [J]. MILCOM 2006, VOLS 1-7, 2006, : 3453 - +
  • [6] Hybrid Stepping Stone Detection Method
    Omar, Mohd Nizam
    Siregar, Lelyzar
    Budiarto, Rahmat
    [J]. DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS, 2008, : 134 - +
  • [7] Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
    Yang, Jianhua
    Woolbright, David
    [J]. COMPUTERS & SECURITY, 2011, 30 (6-7) : 538 - 546
  • [8] An Effective Approach for Stepping-Stone Intrusion Detection Resistant to Intruders' Chaff-Perturbation via Packet Crossover
    Wang, Lixin
    Yang, Jianhua
    Kim, Jae
    Wan, Peng-Jun
    [J]. ELECTRONICS, 2023, 12 (18)
  • [9] Evading Stepping-Stone Detection with Enough Chaff
    Clausen, Henry
    Gibson, Michael S.
    Aspinall, David
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 431 - 446
  • [10] A signal processing perspective to stepping-stone detection
    He, Ting
    Tong, Lang
    [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 687 - 692