1 research outputs found

    Integrate stepping-stone intrusion detection technique into cybersecurity curriculum

    No full text
    © 2017 IEEE. In this paper, we first introduce stepping-stone intrusion, and summarize the most popular techniques to detect stepping-stone attacks. Upon summarizing stepping-stone intrusion detection techniques, five modules are proposed and integrated into cybersecurity curriculum. Ten labs which span from making stepping-stone intrusion, collecting TCP/IP packets, matching Send and Echo packets, comparing thumbprint, estimating the length of a connection chain, to identifying crossover packets, are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection
    corecore