Integrate Stepping-stone Intrusion Detection Technique into Cybersecurity Curriculum

被引:0
|
作者
Yang, Jianhua [1 ]
Zhang, Yongzhong [2 ]
Zhao, Guoqing [3 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
[2] Shanghai Open Univ, Sch Informat Engn, 288 Guoshun Rd, Shanghai 112010, Peoples R China
[3] Beijing Inst Petrochem Technol, Coll Informat Engn, 19 Qingyuan Rd, Beijing 102617, Peoples R China
来源
2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017) | 2017年
关键词
Stepping-stone; Cybersecurity; Intrusion Detection; Network Security; Information Assurance; TCP/IP PACKETS;
D O I
10.1109/WAINA.2017.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we first introduce stepping-stone intrusion, and summarize the most popular techniques to detect stepping-stone attacks. Upon summarizing stepping-stone intrusion detection techniques, five modules are proposed and integrated into cybersecurity curriculum. Ten labs which span from making stepping-stone intrusion, collecting TCP/IP packets, matching Send and Echo packets, comparing thumbprint, estimating the length of a connection chain, to identifying crossover packets, are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [1] Modeling and Detecting Stepping-Stone Intrusion
    Zhang, Yongzhong
    Yang, Jianhua
    Ye, Chunming
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 200 - 205
  • [2] A research survey in stepping-stone intrusion detection
    Lixin Wang
    Jianhua Yang
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [3] A research survey in stepping-stone intrusion detection
    Wang, Lixin
    Yang, Jianhua
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [4] Manipulating network traffic to evade stepping-stone intrusion detection
    Yang, Jianhua
    Wang, Lixin
    Lesh, Andrew
    Lockerbie, Brian
    INTERNET OF THINGS, 2018, 3-4 : 34 - 45
  • [5] Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection
    Yang, Jianhua
    Zhang, Yongzhong
    King, Robert
    Tolbert, Tim
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 515 - 520
  • [6] Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
    Yang, Jianhua
    Wang, Lixin
    SENSORS, 2021, 21 (22)
  • [7] Mining TCP/IP packets to detect stepping-stone intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    COMPUTERS & SECURITY, 2007, 26 (7-8) : 479 - 484
  • [8] Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion
    Sheng, Yingjie
    Zhang, Yongzhong
    Yang, Jianhua
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 862 - 867
  • [9] Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
    Yang, Jianhua
    Woolbright, David
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 538 - 546
  • [10] Matching TCP/IP Packets to Detect Stepping-Stone Intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 269 - 276