Back to Search
Start Over
Detecting Stepping-Stone Intrusion and Resisting Intruders' Manipulation via Cross-Matching Network Traffic and Random Walk.
- Source :
- Electronics (2079-9292); Jan2023, Vol. 12 Issue 2, p394, 19p
- Publication Year :
- 2023
-
Abstract
- Attackers can exploit compromised hosts to launch attacks over the Internet. This protects an intruder, placing them behind a long connection chain consisting of multiple compromised hosts. Such attacks are called stepping-stone intrusions. Many algorithms have been proposed to detect stepping-stone intrusions, but most detection algorithms are weak in resisting intruders' session manipulation, such as chaff-perturbation. This paper proposes a novel detection algorithm: Packet Cross-Matching and RTT-based two-dimensional random walk. Theoretical proof shows network traffic cross matching can be effective in resisting attackers' chaff attack. Our experimental results over the AWS cloud show that the proposed algorithm can resist attackers' chaff attacks up to a chaff rate of 100%. [ABSTRACT FROM AUTHOR]
- Subjects :
- RANDOM walks
INTRUSION detection systems (Computer security)
ALGORITHMS
Subjects
Details
- Language :
- English
- ISSN :
- 20799292
- Volume :
- 12
- Issue :
- 2
- Database :
- Complementary Index
- Journal :
- Electronics (2079-9292)
- Publication Type :
- Academic Journal
- Accession number :
- 161437695
- Full Text :
- https://doi.org/10.3390/electronics12020394