Stepping-stone detection technique for recognizing legitimate and attack connections

A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify...

Full description

Saved in:
Bibliographic Details
Main Authors: Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam
Format: Conference or Workshop Item
Language:English
Published: 2015
Subjects:
Online Access:http://repo.uum.edu.my/15597/1/PID189.pdf
http://repo.uum.edu.my/15597/
http://www.icoci.cms.net.my/proceedings/2015/TOC.html
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
Be the first to leave a comment!
You must be logged in first