Integrate Stepping-stone Intrusion Detection Technique into Cybersecurity Curriculum

被引:0
作者
Yang, Jianhua [1 ]
Zhang, Yongzhong [2 ]
Zhao, Guoqing [3 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
[2] Shanghai Open Univ, Sch Informat Engn, 288 Guoshun Rd, Shanghai 112010, Peoples R China
[3] Beijing Inst Petrochem Technol, Coll Informat Engn, 19 Qingyuan Rd, Beijing 102617, Peoples R China
来源
2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017) | 2017年
关键词
Stepping-stone; Cybersecurity; Intrusion Detection; Network Security; Information Assurance; TCP/IP PACKETS;
D O I
10.1109/WAINA.2017.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we first introduce stepping-stone intrusion, and summarize the most popular techniques to detect stepping-stone attacks. Upon summarizing stepping-stone intrusion detection techniques, five modules are proposed and integrated into cybersecurity curriculum. Ten labs which span from making stepping-stone intrusion, collecting TCP/IP packets, matching Send and Echo packets, comparing thumbprint, estimating the length of a connection chain, to identifying crossover packets, are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [21] Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion
    Chen, Zixuan
    Zheng, Chao
    Li, Zhao
    Shi, Jinqiao
    Li, Zeyu
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2110 - 2115
  • [22] Detecting Stepping-Stone Connection using Association Rule Mining
    Kuo, Ying-Wei
    Huang, Shou-Hsuan Stephen
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 90 - 97
  • [23] Detecting Stepping-Stone Intruders with Long Connection Chains
    Ding, Wei
    Hausknecht, Matthew J.
    Huang, Shou-Hsuan Stephen
    Riggle, Zach
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 665 - +
  • [24] Detecting Chaff Perturbation on Stepping-Stone Connection
    Huang, Shou-Hsuan Stephen
    Kuo, Ying-Wei
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 660 - 667
  • [25] Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
    Coskun, Baris
    Memon, Nasir
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 473 - 483
  • [26] Detecting Multi-Hop Stepping-Stone Pairs with Chaff and Clock Skew
    Kuo, Ying-Wei
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 452 - 461
  • [27] Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming
    Yang, Jianhua
    Ray, Lydia
    Zhao, Guoqing
    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 151 - 158
  • [28] Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
    Donoho, DL
    Flesia, AG
    Shankar, U
    Paxson, V
    Coit, J
    Staniford, S
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 17 - 35
  • [29] Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections
    Huang, Shou-Hsuan Stephen
    Zhang, Hongyang
    Phay, Michael
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 1043 - 1050
  • [30] Intrusion Detection for Cybersecurity of Smart Meters
    Sun, Chih-Che
    Cardenas, D. Jonathan Sebastian
    Hahn, Adam
    Liu, Chen-Ching
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) : 612 - 622