2 research outputs found

    A quick-response real-time stepping stone detection scheme

    Full text link
    Stepping stone attacks are often used by network intruders to hide their identities. To detect and block stepping stone attacks, a stepping stone detection scheme should be able to correctly identify a stepping-stone in a very short time and in real-time. However, the majority of past research has failed to indicate how long or how many packets it takes for the monitor to detect a stepping stone. In this paper, we propose a novel quick-response real-time stepping stones detection scheme which is based on packet delay properties. Our experiments show that it can identify a stepping stone within 20 seconds which includes false positives and false negatives of less than 3%

    Detecting backdoor using stepping stone detection approach

    Get PDF
    Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years, SSD was only confined to detect this type of intrusion.This paper discusses the using of SSD approach and potential applications in other emerging field by introduce the using of SSD concepts in backdoor attack detection field.This research shows that by using SSD to detect backdoor attack can be gained very low false negative and false positive rates and reduces the scan process time detection
    corecore