Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone Intrusion

被引:0
|
作者
Yang, Jianhua [1 ]
Wang, Lixin [1 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
关键词
stepping-stone intrusion; downstream detection; round-trip time; standard deviation of RTT; network traffic distribution;
D O I
10.3390/electronics13163258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past three decades, stepping-stone intrusion has become a professional and primary way used by intruders to launch their attacks since they can be protected behind a long TCP connection chain. Many different algorithms have been proposed to detect stepping-stone intrusion since 1995. But most algorithms cannot resist intruders' session manipulation. In this paper, we propose a novel approach using the distribution of round-trip time (RTT) of network traffic to detect stepping-stone intrusion. This approach can resist intruders' chaff-perturbation since the round-trip time of network packets can fairly be affected by chaffed packets. The ratio between the standard deviation of the RTTs between Send and Echo packets and the standard deviation of the RTTs between Send and Ack packets can be used to predict if a stepping-stone intrusion exists. The closer to 0 the ratio, the more suspicious a stepping-stone intrusion.
引用
收藏
页数:16
相关论文
共 43 条
  • [21] Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
    Zhao, Guoqing
    Yang, Jianhua
    Hura, Gurdeep S.
    Ni, Long
    Huang, Shou-Hsuan Stephen
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 546 - +
  • [22] Performance of neural networks in stepping-stone intrusion detection
    Wu, Han-Ching
    Stephen Huang, Shou-Hsuan
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 608 - 613
  • [23] Detecting Stepping-Stone Intrusion and Resisting Intruders' Manipulation via Cross-Matching Network Traffic and Random Walk
    Yang, Jianhua
    Wang, Lixin
    Qin, Maochang
    Neundorfer, Noah
    ELECTRONICS, 2023, 12 (02)
  • [24] Neural networks-based detection of stepping-stone intrusion
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (02) : 1431 - 1437
  • [25] Integrate Stepping-stone Intrusion Detection Technique into Cybersecurity Curriculum
    Yang, Jianhua
    Zhang, Yongzhong
    Zhao, Guoqing
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 1 - 6
  • [26] Detecting stepping-stone intrusion using association rule mining
    Hsiao, Han-Wei
    Sun, Huey-Min
    Fan, Wei-Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1225 - 1235
  • [27] Applying Signal Processing Technology to Stepping-Stone Intrusion Detection
    Zhang, Yongzhong
    Ye, Chunming
    Yang, Jianhua
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 375 - +
  • [28] Stepping-Stone Intrusion Detection Using Neural Networks Approach
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 358 - 363
  • [29] Stepping-stone detection via request-response traffic analysis
    Huang, Shou-Husan Stephen
    Lychev, Robert
    Yang, Jianhua
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 276 - +
  • [30] Resistance analysis to intruders' evasion of a novel algorithm to detect stepping-stone
    Zhang, Yongzhong
    Yang, Jianhua
    Ye, Chunming
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 477 - 486