A research survey in stepping-stone intrusion detection

被引:5
|
作者
Wang, Lixin [1 ]
Yang, Jianhua [1 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
关键词
Stepping-stones; Intrusion detection; Connection chain; TCP connection; Sensor; Computer networks;
D O I
10.1186/s13638-018-1303-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using tools such as telnet, rlogin, or SSH. A benefit of using stepping-stones to launch attacks is that intruders can be hidden by a long interactive session. Since each interactive TCP session between a client and a server is independent of other sessions even though the sessions may be relayed, so accessing a server via multiple relayed TCP sessions can make it much harder to tell the intruder's geographical location unless all the compromised servers collaborate with each other and work efficiently. Due to such a nature of TCP protocol, the final victim host can only see the traffic from the last session of the connection chain, and it is extremely difficult for the victim host to learn any information about the origin of the attack. This paper provides a research survey in the area of stepping-stone intrusion detection. Most of the significant approaches developed by far for stepping-stone intrusion detection are included in this paper. These detection methods are put into two categories: host-based and network-based (i.e., connection-chain based), according to whether multiple hosts in the connection chain are involved in the design of detection algorithms. In each category, the detection algorithms are divided into several different subsections based on the key techniques used in the algorithms. At the end of the paper, several important and challenging open problems are proposed in this area.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Intrusion Detection in SCADA System: A Survey
    Zeng, Pu
    Zhou, Peng
    INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 : 342 - 351
  • [32] Survey of federated learning in intrusion detection
    Zhang, Hao
    Ye, Junwei
    Huang, Wei
    Liu, Ximeng
    Gu, Jason
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2025, 195
  • [33] Intrusion detection and Big Heterogeneous Data: a Survey
    Zuech R.
    Khoshgoftaar T.M.
    Wald R.
    J. Big Data, 1 (1):
  • [34] A survey of intrusion detection in wireless network applications
    Mitchell, Robert
    Chen, Ing-Ray
    COMPUTER COMMUNICATIONS, 2014, 42 : 1 - 23
  • [35] A survey of VoIP intrusions and intrusion detection systems
    Vuong, S
    Bai, Y
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 317 - 322
  • [36] Survey of Genetic Algorithm Effectiveness in Intrusion Detection
    Gnanaprasanambikai, L.
    Munusamy, Nagarajan
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [37] A survey of coordinated attacks and collaborative intrusion detection
    Zhou, Chenfeng Vincent
    Leckie, Christopher
    Karunasekera, Shanika
    COMPUTERS & SECURITY, 2010, 29 (01) : 124 - 140
  • [38] A Survey of Parallel Intrusion Detection on Graphical Processors
    Vokorokos, Liberios
    Ennert, Michal
    Hartinger, Miroslav
    Radusovsky, Jan
    INFORMATICS 2013: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS, 2013, : 50 - 55
  • [39] A Survey of parallel intrusion detection on graphical processors
    Vokorokos, Liberios
    Ennert, Michal
    Cajkovsky, Marek
    Radusovsky, Jan
    OPEN COMPUTER SCIENCE, 2014, 4 (04): : 222 - 230
  • [40] Graph Neural Networks for Intrusion Detection: A Survey
    Bilot, Tristan
    Madhoun, Nour El
    Al Agha, Khaldoun
    Zouaoui, Anis
    IEEE ACCESS, 2023, 11 : 49114 - 49139