Stepping-stone detection technique for recognizing legitimate and attack connections

A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify...

Full description

Saved in:
Bibliographic Details
Main Authors: Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam
Format: Conference or Workshop Item
Language:English
Published: 2015
Subjects:
Online Access:http://repo.uum.edu.my/15597/1/PID189.pdf
http://repo.uum.edu.my/15597/
http://www.icoci.cms.net.my/proceedings/2015/TOC.html
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
id my.uum.repo.15597
record_format eprints
spelling my.uum.repo.155972016-04-27T02:27:49Z http://repo.uum.edu.my/15597/ Stepping-stone detection technique for recognizing legitimate and attack connections Daud, Ali Yusny Ghazali, Osman Omar, Mohd Nizam QA75 Electronic computers. Computer science A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users. 2015 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/15597/1/PID189.pdf Daud, Ali Yusny and Ghazali, Osman and Omar, Mohd Nizam (2015) Stepping-stone detection technique for recognizing legitimate and attack connections. In: 5th International Conference on Computing and Informatics (ICOCI) 2015, 11-13 August 2015, Istanbul, Turkey. http://www.icoci.cms.net.my/proceedings/2015/TOC.html
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Daud, Ali Yusny
Ghazali, Osman
Omar, Mohd Nizam
Stepping-stone detection technique for recognizing legitimate and attack connections
description A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.
format Conference or Workshop Item
author Daud, Ali Yusny
Ghazali, Osman
Omar, Mohd Nizam
author_facet Daud, Ali Yusny
Ghazali, Osman
Omar, Mohd Nizam
author_sort Daud, Ali Yusny
title Stepping-stone detection technique for recognizing legitimate and attack connections
title_short Stepping-stone detection technique for recognizing legitimate and attack connections
title_full Stepping-stone detection technique for recognizing legitimate and attack connections
title_fullStr Stepping-stone detection technique for recognizing legitimate and attack connections
title_full_unstemmed Stepping-stone detection technique for recognizing legitimate and attack connections
title_sort stepping-stone detection technique for recognizing legitimate and attack connections
publishDate 2015
url http://repo.uum.edu.my/15597/1/PID189.pdf
http://repo.uum.edu.my/15597/
http://www.icoci.cms.net.my/proceedings/2015/TOC.html
_version_ 1644281758649155584