Omar, Mohd Nizam and Amphawan, Angela and Din, Roshidi (2013) A stepping stone perspective to detection of network threats. International Journal of Applied Mathematics and Informatics, 7 (3). pp. 97-106. ISSN 1998-0140
PDF
Restricted to Registered users only Download (472kB) | Request a copy |
Abstract
Current computing trends such as cloud computing, file sharing and social networking promote collaboration and allow greater mobility for users.Nevertheless, these computing trends increase the vulnerability of networks to security threats and challenge network resources.An ingenious technique employed by attackers for retaining anonymity is by exploiting intermediary host computers or stepping stones to instigate attacks on other computers.This paper explores novel application of the stepping stone detection concept in addressing network threats such as spams, backdoors, proxy server intrusions and denial of service attacks.Preliminary stepping stone detection models for each security threat will be constructed and the potential detection process is delineated.These preliminary concepts and models may prove useful for further optimization of network security in conjunction with other conventional detection techniques.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Stepping stone, stepping stone detection, spam, backdoor, proxy server detection, DoS, DDoS. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | College of Arts and Sciences |
Depositing User: | Dr. Mohd. Nizam Omar |
Date Deposited: | 17 May 2015 08:07 |
Last Modified: | 17 May 2015 08:07 |
URI: | https://repo.uum.edu.my/id/eprint/14208 |
Actions (login required)
View Item |