Back to Search Start Over

Detecting Stepping-Stone Intrusion and Resisting Intruders' Manipulation via Cross-Matching Network Traffic and Random Walk.

Authors :
Yang, Jianhua
Wang, Lixin
Qin, Maochang
Neundorfer, Noah
Source :
Electronics (2079-9292); Jan2023, Vol. 12 Issue 2, p394, 19p
Publication Year :
2023

Abstract

Attackers can exploit compromised hosts to launch attacks over the Internet. This protects an intruder, placing them behind a long connection chain consisting of multiple compromised hosts. Such attacks are called stepping-stone intrusions. Many algorithms have been proposed to detect stepping-stone intrusions, but most detection algorithms are weak in resisting intruders' session manipulation, such as chaff-perturbation. This paper proposes a novel detection algorithm: Packet Cross-Matching and RTT-based two-dimensional random walk. Theoretical proof shows network traffic cross matching can be effective in resisting attackers' chaff attack. Our experimental results over the AWS cloud show that the proposed algorithm can resist attackers' chaff attacks up to a chaff rate of 100%. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20799292
Volume :
12
Issue :
2
Database :
Complementary Index
Journal :
Electronics (2079-9292)
Publication Type :
Academic Journal
Accession number :
161437695
Full Text :
https://doi.org/10.3390/electronics12020394