2010 24th IEEE International Conference on Advanced Information Networking and Applications 2010
DOI: 10.1109/aina.2010.132
|View full text |Cite
|
Sign up to set email alerts
|

Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain

Abstract: Stepping-stone attack in network intrusion detection are attackers who use a sequence of intermediate (or so called stepping-stone) hosts to initiate attacks in order to hide their origins. We investigate a number of dynamic programming based pattern recognition approaches and our novel algorithm for detecting correlation and similarity of two connections not only into and out of a single stepping stone host(consecutive streams), but also across multiple stepping-stone hosts. The goal of this paper is to find … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 26 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…Zhang et al [12] proposed resisting intruders' manipulation using context-based TCP/IP packet-matching. Dynamic programing and data mining techniques were used to detect stepping-stone intrusion [13,14]. Sheng et al [15] proposed to detect stepping-stone intrusion via mining network traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhang et al [12] proposed resisting intruders' manipulation using context-based TCP/IP packet-matching. Dynamic programing and data mining techniques were used to detect stepping-stone intrusion [13,14]. Sheng et al [15] proposed to detect stepping-stone intrusion via mining network traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Yang et al [16] developed an algorithm to detect stepping-stone intrusion and resist intruders' chaff attack based on packet cross-matching and RTT-based random walk. All the above approaches [11][12][13][14][15] suffer from a low packet-matching rate and, thus, cannot resist intruders' chaff-perturbation rate to a high percentage.…”
Section: Literature Reviewmentioning
confidence: 99%