Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone Intrusion

被引:0
|
作者
Yang, Jianhua [1 ]
Wang, Lixin [1 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
关键词
stepping-stone intrusion; downstream detection; round-trip time; standard deviation of RTT; network traffic distribution;
D O I
10.3390/electronics13163258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past three decades, stepping-stone intrusion has become a professional and primary way used by intruders to launch their attacks since they can be protected behind a long TCP connection chain. Many different algorithms have been proposed to detect stepping-stone intrusion since 1995. But most algorithms cannot resist intruders' session manipulation. In this paper, we propose a novel approach using the distribution of round-trip time (RTT) of network traffic to detect stepping-stone intrusion. This approach can resist intruders' chaff-perturbation since the round-trip time of network packets can fairly be affected by chaffed packets. The ratio between the standard deviation of the RTTs between Send and Echo packets and the standard deviation of the RTTs between Send and Ack packets can be used to predict if a stepping-stone intrusion exists. The closer to 0 the ratio, the more suspicious a stepping-stone intrusion.
引用
收藏
页数:16
相关论文
共 43 条
  • [1] Monitoring Network Traffic to Detect Stepping-Stone Intrusion
    Yang, Jianhua
    Lee, Byong
    Huang, Stephen S. H.
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 56 - +
  • [2] Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion
    Sheng, Yingjie
    Zhang, Yongzhong
    Yang, Jianhua
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 862 - 867
  • [3] Manipulating network traffic to evade stepping-stone intrusion detection
    Yang, Jianhua
    Wang, Lixin
    Lesh, Andrew
    Lockerbie, Brian
    INTERNET OF THINGS, 2018, 3-4 : 34 - 45
  • [4] Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection
    Yang, Jianhua
    Zhang, Yongzhong
    King, Robert
    Tolbert, Tim
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 515 - 520
  • [5] Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering
    Wang, Lixin
    Yang, Jianhua
    Mccormick, Mary
    Wan, Peng-Jun
    Xu, Xiaohua
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [6] Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming
    Yang, Jianhua
    Ray, Lydia
    Zhao, Guoqing
    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 151 - 158
  • [7] Matching TCP/IP Packets to Detect Stepping-Stone Intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 269 - 276
  • [8] Mining TCP/IP packets to detect stepping-stone intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    COMPUTERS & SECURITY, 2007, 26 (7-8) : 479 - 484
  • [9] Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
    Yang, Jianhua
    Wang, Lixin
    SENSORS, 2021, 21 (22)
  • [10] Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
    Yang, Jianhua
    Woolbright, David
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 538 - 546