A research survey in stepping-stone intrusion detection

被引:5
|
作者
Wang, Lixin [1 ]
Yang, Jianhua [1 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
关键词
Stepping-stones; Intrusion detection; Connection chain; TCP connection; Sensor; Computer networks;
D O I
10.1186/s13638-018-1303-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using tools such as telnet, rlogin, or SSH. A benefit of using stepping-stones to launch attacks is that intruders can be hidden by a long interactive session. Since each interactive TCP session between a client and a server is independent of other sessions even though the sessions may be relayed, so accessing a server via multiple relayed TCP sessions can make it much harder to tell the intruder's geographical location unless all the compromised servers collaborate with each other and work efficiently. Due to such a nature of TCP protocol, the final victim host can only see the traffic from the last session of the connection chain, and it is extremely difficult for the victim host to learn any information about the origin of the attack. This paper provides a research survey in the area of stepping-stone intrusion detection. Most of the significant approaches developed by far for stepping-stone intrusion detection are included in this paper. These detection methods are put into two categories: host-based and network-based (i.e., connection-chain based), according to whether multiple hosts in the connection chain are involved in the design of detection algorithms. In each category, the detection algorithms are divided into several different subsections based on the key techniques used in the algorithms. At the end of the paper, several important and challenging open problems are proposed in this area.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Literature Survey on Intrusion Detection Systems in MANETs
    Kundu, Pooja
    Kashyap, Neeti
    Yadav, Neha
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, INDIA 2016, 2016, 433 : 357 - 366
  • [42] A survey of intrusion detection systems in smart grid
    Jow, Julius
    Xiao, Yang
    Han, Wenlin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (03) : 170 - 186
  • [43] A survey of intrusion detection on industrial control systems
    Hu, Yan
    Yang, An
    Li, Hong
    Sun, Yuyan
    Sun, Limin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (08):
  • [44] A Survey for Intrusion Detection Systems in Open RAN
    Amachaghi, Emmanuel N.
    Shojafar, Mohammad
    Foh, Chuan Heng
    Moessner, Klaus
    IEEE ACCESS, 2024, 12 : 88146 - 88173
  • [45] Research of pattern matching in intrusion detection
    Huang, JC
    Tian, JF
    Du, RZ
    Zhai, JQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1877 - 1882
  • [46] Evidential reasoning research on intrusion detection
    Wang, XP
    Xu, H
    Zheng, S
    Cheng, AY
    FIFTH INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND CONTROL TECHNOLOGY, 2003, 5253 : 930 - 934
  • [47] Research on sharing of intrusion detection information
    Xiong, JJ
    Zhang, R
    Zhu, GM
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 549 - 552
  • [48] Research on an Improved Intrusion Detection Algorithm
    Liu, Yue
    Li, Mei-shan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 303 - 316
  • [49] The Research of Intrusion Detection Based On Intelligentization
    Zhang, Liang
    Sun, Haoyue
    Lv, Guo
    Sun, Xiaolu
    MECHANICAL DESIGN AND POWER ENGINEERING, PTS 1 AND 2, 2014, 490-491 : 1588 - +
  • [50] Research on distributed intrusion detection system
    Wang, Zeng-Quan
    Wang, Hui-Qiang
    Zhao, Qian
    Zhang, Rui-Jie
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 181 - +