A research survey in stepping-stone intrusion detection

被引:5
|
作者
Wang, Lixin [1 ]
Yang, Jianhua [1 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
关键词
Stepping-stones; Intrusion detection; Connection chain; TCP connection; Sensor; Computer networks;
D O I
10.1186/s13638-018-1303-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using tools such as telnet, rlogin, or SSH. A benefit of using stepping-stones to launch attacks is that intruders can be hidden by a long interactive session. Since each interactive TCP session between a client and a server is independent of other sessions even though the sessions may be relayed, so accessing a server via multiple relayed TCP sessions can make it much harder to tell the intruder's geographical location unless all the compromised servers collaborate with each other and work efficiently. Due to such a nature of TCP protocol, the final victim host can only see the traffic from the last session of the connection chain, and it is extremely difficult for the victim host to learn any information about the origin of the attack. This paper provides a research survey in the area of stepping-stone intrusion detection. Most of the significant approaches developed by far for stepping-stone intrusion detection are included in this paper. These detection methods are put into two categories: host-based and network-based (i.e., connection-chain based), according to whether multiple hosts in the connection chain are involved in the design of detection algorithms. In each category, the detection algorithms are divided into several different subsections based on the key techniques used in the algorithms. At the end of the paper, several important and challenging open problems are proposed in this area.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Mining TCP packets to detect stepping-stone intrusion (non-reviewed)
    Ni, Long
    Yang, Jianhua
    Song, David Y.
    PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, 2008, : 260 - 260
  • [42] Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion
    Chen, Zixuan
    Zheng, Chao
    Li, Zhao
    Shi, Jinqiao
    Li, Zeyu
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2110 - 2115
  • [43] RTT-based Random Walk Approach to Detect Stepping-Stone Intrusion
    Yang, Jianhua
    Zhang, Yongzhong
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 558 - 563
  • [44] Stepping-stone detection algorithm based on order preserving mapping
    Kuo, Ying-Wei
    Huang, Shou-Hsuan Stephen
    2007 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOLS 1 AND 2, 2007, : 275 - 282
  • [45] Evolution of stepping-stone dispersal rates
    Gandon, S
    Rousset, F
    PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 1999, 266 (1437) : 2507 - 2513
  • [46] An Effective Approach for Stepping-Stone Intrusion Detection Resistant to Intruders' Chaff-Perturbation via Packet Crossover
    Wang, Lixin
    Yang, Jianhua
    Kim, Jae
    Wan, Peng-Jun
    ELECTRONICS, 2023, 12 (18)
  • [47] Ethics and Welfare in invertebrates: a stepping-stone to research and animal production
    Crespi-Abril, Augusto C.
    Rubilar, Tamara
    REVISTA DE BIOLOGIA TROPICAL, 2024, 72
  • [48] A Hybrid Stepping-Stone Detection Algorithm to Counter Packet Jittering Evasion
    Huang, Shou-Hsuan Stephen
    Ding, Wei
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (02): : 83 - 92
  • [49] Stepping-stone detection via request-response traffic analysis
    Huang, Shou-Husan Stephen
    Lychev, Robert
    Yang, Jianhua
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 276 - +
  • [50] Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
    Zhao, Guoqing
    Yang, Jianhua
    Hura, Gurdeep S.
    Ni, Long
    Huang, Shou-Hsuan Stephen
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 546 - +