Integrate Stepping-stone Intrusion Detection Technique into Cybersecurity Curriculum

被引:0
|
作者
Yang, Jianhua [1 ]
Zhang, Yongzhong [2 ]
Zhao, Guoqing [3 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
[2] Shanghai Open Univ, Sch Informat Engn, 288 Guoshun Rd, Shanghai 112010, Peoples R China
[3] Beijing Inst Petrochem Technol, Coll Informat Engn, 19 Qingyuan Rd, Beijing 102617, Peoples R China
关键词
Stepping-stone; Cybersecurity; Intrusion Detection; Network Security; Information Assurance; TCP/IP PACKETS;
D O I
10.1109/WAINA.2017.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we first introduce stepping-stone intrusion, and summarize the most popular techniques to detect stepping-stone attacks. Upon summarizing stepping-stone intrusion detection techniques, five modules are proposed and integrated into cybersecurity curriculum. Ten labs which span from making stepping-stone intrusion, collecting TCP/IP packets, matching Send and Echo packets, comparing thumbprint, estimating the length of a connection chain, to identifying crossover packets, are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [1] A research survey in stepping-stone intrusion detection
    Wang, Lixin
    Yang, Jianhua
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [2] A research survey in stepping-stone intrusion detection
    Lixin Wang
    Jianhua Yang
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [3] Performance of neural networks in stepping-stone intrusion detection
    Wu, Han-Ching
    Stephen Huang, Shou-Hsuan
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 608 - 613
  • [4] Neural networks-based detection of stepping-stone intrusion
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (02) : 1431 - 1437
  • [5] Modeling and Detecting Stepping-Stone Intrusion
    Zhang, Yongzhong
    Yang, Jianhua
    Ye, Chunming
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 200 - 205
  • [6] Applying Signal Processing Technology to Stepping-Stone Intrusion Detection
    Zhang, Yongzhong
    Ye, Chunming
    Yang, Jianhua
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 375 - +
  • [7] Manipulating network traffic to evade stepping-stone intrusion detection
    Yang, Jianhua
    Wang, Lixin
    Lesh, Andrew
    Lockerbie, Brian
    INTERNET OF THINGS, 2018, 3-4 : 34 - 45
  • [8] Stepping-Stone Intrusion Detection Using Neural Networks Approach
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 358 - 363
  • [9] Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection
    Yang, Jianhua
    Zhang, Yongzhong
    King, Robert
    Tolbert, Tim
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 515 - 520
  • [10] STEPPING-STONE DETECTION TECHNIQUE FOR RECOGNIZING LEGITIMATE AND ATTACK CONNECTIONS
    Daud, Ali Yusny
    Ghazali, Osman
    Omar, Mohd Nizam
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 440 - 446