Integrate Stepping-stone Intrusion Detection Technique into Cybersecurity Curriculum

被引:0
|
作者
Yang, Jianhua [1 ]
Zhang, Yongzhong [2 ]
Zhao, Guoqing [3 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
[2] Shanghai Open Univ, Sch Informat Engn, 288 Guoshun Rd, Shanghai 112010, Peoples R China
[3] Beijing Inst Petrochem Technol, Coll Informat Engn, 19 Qingyuan Rd, Beijing 102617, Peoples R China
关键词
Stepping-stone; Cybersecurity; Intrusion Detection; Network Security; Information Assurance; TCP/IP PACKETS;
D O I
10.1109/WAINA.2017.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we first introduce stepping-stone intrusion, and summarize the most popular techniques to detect stepping-stone attacks. Upon summarizing stepping-stone intrusion detection techniques, five modules are proposed and integrated into cybersecurity curriculum. Ten labs which span from making stepping-stone intrusion, collecting TCP/IP packets, matching Send and Echo packets, comparing thumbprint, estimating the length of a connection chain, to identifying crossover packets, are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [21] A STEPPING-STONE OR A CAREER
    VANN, AS
    EDUCATIONAL LEADERSHIP, 1992, 49 (07) : 89 - 89
  • [22] Stepping-stone mobility
    Jovanovic, B
    Nyarko, Y
    CARNEGIE-ROCHESTER CONFERENCE SERIES ON PUBLIC POLICY, VOL 46, JUNE 1997, 1997, 46 : 289 - 325
  • [23] STEPPING-STONE TRAP
    SKOLNICK, JH
    PSYCHOLOGY TODAY, 1983, 17 (01) : 78 - 78
  • [24] Mining Network Traffic with the k-Means Clustering Algorithm for Stepping-Stone Intrusion Detection
    Wang, Lixin
    Yang, Jianhua
    Xu, Xiaohua
    Wan, Peng-Jun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [25] A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation
    Wang, Lixin
    Yang, Jianhua
    Workman, Michael
    Wan, Peng-Jun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [26] Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
    Yang, Jianhua
    Woolbright, David
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 538 - 546
  • [27] Characterizing and estimating network fluctuation for detecting interactive stepping-stone intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 70 - 75
  • [28] Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone Intrusion
    Yang, Jianhua
    Wang, Lixin
    ELECTRONICS, 2024, 13 (16)
  • [29] Effective algorithms to detect stepping-stone intrusion by removing outliers of packet RTTs
    Wang, Lixin
    Yang, Jianhua
    Workman, Michael
    Wan, Pengjun
    TSINGHUA SCIENCE AND TECHNOLOGY, 2022, 27 (02) : 432 - 442
  • [30] 'Stepping-stone' path to anywhere
    Morring, F
    AVIATION WEEK & SPACE TECHNOLOGY, 2002, 157 (23): : 48 - 49