Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone Intrusion

被引:0
|
作者
Yang, Jianhua [1 ]
Wang, Lixin [1 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
关键词
stepping-stone intrusion; downstream detection; round-trip time; standard deviation of RTT; network traffic distribution;
D O I
10.3390/electronics13163258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past three decades, stepping-stone intrusion has become a professional and primary way used by intruders to launch their attacks since they can be protected behind a long TCP connection chain. Many different algorithms have been proposed to detect stepping-stone intrusion since 1995. But most algorithms cannot resist intruders' session manipulation. In this paper, we propose a novel approach using the distribution of round-trip time (RTT) of network traffic to detect stepping-stone intrusion. This approach can resist intruders' chaff-perturbation since the round-trip time of network packets can fairly be affected by chaffed packets. The ratio between the standard deviation of the RTTs between Send and Echo packets and the standard deviation of the RTTs between Send and Ack packets can be used to predict if a stepping-stone intrusion exists. The closer to 0 the ratio, the more suspicious a stepping-stone intrusion.
引用
收藏
页数:16
相关论文
共 43 条
  • [41] Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic
    Sourek, Gustav
    Kuzelka, Ondrej
    Zelezny, Filip
    INTELLIGENT MECHANISMS FOR NETWORK CONFIGURATION AND SECURITY, 2015, 9122 : 73 - 86
  • [42] Learning Latent Distribution for Distinguishing Network Traffic in Intrusion Detection System
    Ly Vu
    Van Loi Cao
    Quang Uy Nguyen
    Nguyen, Diep N.
    Dinh Thai Hoang
    Dutkiewicz, Eryk
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [43] Utilizing Deep Learning Techniques to Detect Zero Day Exploits in Network Traffic Flows
    Drozdenko, Benjamin
    Powell, Makia
    2022 IEEE 13TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2022, : 163 - 172