mailto:uumlib@uum.edu.my 24x7 Service; AnyTime; AnyWhere

A stepping stone perspective to detection of network threats

Omar, Mohd Nizam and Amphawan, Angela and Din, Roshidi (2013) A stepping stone perspective to detection of network threats. International Journal of Applied Mathematics and Informatics, 7 (3). pp. 97-106. ISSN 1998-0140

[thumbnail of Step.pdf] PDF
Restricted to Registered users only

Download (472kB) | Request a copy

Abstract

Current computing trends such as cloud computing, file sharing and social networking promote collaboration and allow greater mobility for users.Nevertheless, these computing trends increase the vulnerability of networks to security threats and challenge network resources.An ingenious technique employed by attackers for retaining anonymity is by exploiting intermediary host computers or stepping stones to instigate attacks on other computers.This paper explores novel application of the stepping stone detection concept in addressing network threats such as spams, backdoors, proxy server intrusions and denial of service attacks.Preliminary stepping stone detection models for each security threat will be constructed and the potential detection process is delineated.These preliminary concepts and models may prove useful for further optimization of network security in conjunction with other conventional detection techniques.

Item Type: Article
Uncontrolled Keywords: Stepping stone, stepping stone detection, spam, backdoor, proxy server detection, DoS, DDoS.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: College of Arts and Sciences
Depositing User: Dr. Mohd. Nizam Omar
Date Deposited: 17 May 2015 08:07
Last Modified: 17 May 2015 08:07
URI: https://repo.uum.edu.my/id/eprint/14208

Actions (login required)

View Item View Item