A research survey in stepping-stone intrusion detection

被引:5
|
作者
Wang, Lixin [1 ]
Yang, Jianhua [1 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
关键词
Stepping-stones; Intrusion detection; Connection chain; TCP connection; Sensor; Computer networks;
D O I
10.1186/s13638-018-1303-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using tools such as telnet, rlogin, or SSH. A benefit of using stepping-stones to launch attacks is that intruders can be hidden by a long interactive session. Since each interactive TCP session between a client and a server is independent of other sessions even though the sessions may be relayed, so accessing a server via multiple relayed TCP sessions can make it much harder to tell the intruder's geographical location unless all the compromised servers collaborate with each other and work efficiently. Due to such a nature of TCP protocol, the final victim host can only see the traffic from the last session of the connection chain, and it is extremely difficult for the victim host to learn any information about the origin of the attack. This paper provides a research survey in the area of stepping-stone intrusion detection. Most of the significant approaches developed by far for stepping-stone intrusion detection are included in this paper. These detection methods are put into two categories: host-based and network-based (i.e., connection-chain based), according to whether multiple hosts in the connection chain are involved in the design of detection algorithms. In each category, the detection algorithms are divided into several different subsections based on the key techniques used in the algorithms. At the end of the paper, several important and challenging open problems are proposed in this area.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Detecting Stepping-Stone Intruders with Long Connection Chains
    Ding, Wei
    Hausknecht, Matthew J.
    Huang, Shou-Hsuan Stephen
    Riggle, Zach
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 665 - +
  • [22] Detecting Stepping-Stone Connection using Association Rule Mining
    Kuo, Ying-Wei
    Huang, Shou-Hsuan Stephen
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 90 - 97
  • [23] Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
    Coskun, Baris
    Memon, Nasir
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 473 - 483
  • [24] Detecting Multi-Hop Stepping-Stone Pairs with Chaff and Clock Skew
    Kuo, Ying-Wei
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 452 - 461
  • [25] Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections
    Huang, Shou-Hsuan Stephen
    Zhang, Hongyang
    Phay, Michael
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 1043 - 1050
  • [26] Using Dynamic Programming Techniques to Detect Multi-Hop Stepping-Stone Pairs in a Connection Chain
    Kuo, Ying-Wei
    Huang, Shou-Hsuan Stephen
    Ding, Wei
    Kern, Rebecca
    Yang, Jianhua
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 198 - 205
  • [27] Dongsha Atoll is an important stepping-stone that promotes regional genetic connectivity in the South China Sea
    Liu, Shang Yin Vanson
    Green, Jacob
    Briggs, Dana
    Hastings, Ruth
    Jondelius, Ylva
    Kensinger, Skylar
    Leever, Hannah
    Santos, Sophia
    Throne, Trevor
    Cheng, Chi
    Madduppa, Hawis
    Toonen, Robert J.
    Gaither, Michelle R.
    Crandall, Eric D.
    PEERJ, 2021, 9
  • [28] A Survey on Intrusion Detection Tools
    Bhati, Bhoopesh Singh
    Rai, C. S.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 806 - 810
  • [29] Swarm intelligence in intrusion detection: A survey
    Kolias, C.
    Kambourakis, G.
    Maragoudakis, M.
    COMPUTERS & SECURITY, 2011, 30 (08) : 625 - 642
  • [30] Intrusion detection system for CubeSats: a survey
    Driouch, Otman
    Bah, Slimane
    Guennoun, Zouhair
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 596 - 601