Daud, Ali Yusny and Ghazali, Osman and Omar, Mohd Nizam (2015) Stepping-stone detection technique for recognizing legitimate and attack connections. In: 5th International Conference on Computing and Informatics (ICOCI) 2015, 11-13 August 2015, Istanbul, Turkey.
Preview |
PDF
Download (669kB) | Preview |
Abstract
A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | ISBN No: 978-967-0910-02-4 Jointly organized by: Universiti Utara Malaysia & Istanbul Zaim University. |
Uncontrolled Keywords: | stepping-stone connection, stepping-stone detection, intrusion, legitimate, anomaly detection |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | School of Computing |
Depositing User: | Mrs. Norazmilah Yaakub |
Date Deposited: | 01 Oct 2015 08:04 |
Last Modified: | 27 Apr 2016 02:27 |
URI: | https://repo.uum.edu.my/id/eprint/15597 |
Actions (login required)
View Item |