Stepping-stone detection technique for recognizing legitimate and attack connections
A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/15597/1/PID189.pdf http://repo.uum.edu.my/15597/ http://www.icoci.cms.net.my/proceedings/2015/TOC.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.15597 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.155972016-04-27T02:27:49Z http://repo.uum.edu.my/15597/ Stepping-stone detection technique for recognizing legitimate and attack connections Daud, Ali Yusny Ghazali, Osman Omar, Mohd Nizam QA75 Electronic computers. Computer science A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users. 2015 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/15597/1/PID189.pdf Daud, Ali Yusny and Ghazali, Osman and Omar, Mohd Nizam (2015) Stepping-stone detection technique for recognizing legitimate and attack connections. In: 5th International Conference on Computing and Informatics (ICOCI) 2015, 11-13 August 2015, Istanbul, Turkey. http://www.icoci.cms.net.my/proceedings/2015/TOC.html |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Daud, Ali Yusny Ghazali, Osman Omar, Mohd Nizam Stepping-stone detection technique for recognizing legitimate and attack connections |
description |
A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users. |
format |
Conference or Workshop Item |
author |
Daud, Ali Yusny Ghazali, Osman Omar, Mohd Nizam |
author_facet |
Daud, Ali Yusny Ghazali, Osman Omar, Mohd Nizam |
author_sort |
Daud, Ali Yusny |
title |
Stepping-stone detection technique for recognizing legitimate and attack connections |
title_short |
Stepping-stone detection technique for recognizing legitimate and attack connections |
title_full |
Stepping-stone detection technique for recognizing legitimate and attack connections |
title_fullStr |
Stepping-stone detection technique for recognizing legitimate and attack connections |
title_full_unstemmed |
Stepping-stone detection technique for recognizing legitimate and attack connections |
title_sort |
stepping-stone detection technique for recognizing legitimate and attack connections |
publishDate |
2015 |
url |
http://repo.uum.edu.my/15597/1/PID189.pdf http://repo.uum.edu.my/15597/ http://www.icoci.cms.net.my/proceedings/2015/TOC.html |
_version_ |
1644281758649155584 |