mailto:uumlib@uum.edu.my 24x7 Service; AnyTime; AnyWhere

Stepping-stone detection technique for recognizing legitimate and attack connections

Daud, Ali Yusny and Ghazali, Osman and Omar, Mohd Nizam (2015) Stepping-stone detection technique for recognizing legitimate and attack connections. In: 5th International Conference on Computing and Informatics (ICOCI) 2015, 11-13 August 2015, Istanbul, Turkey.

[thumbnail of PID189.pdf]
Preview
PDF
Download (669kB) | Preview

Abstract

A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.

Item Type: Conference or Workshop Item (Paper)
Additional Information: ISBN No: 978-967-0910-02-4 Jointly organized by: Universiti Utara Malaysia & Istanbul Zaim University.
Uncontrolled Keywords: stepping-stone connection, stepping-stone detection, intrusion, legitimate, anomaly detection
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: School of Computing
Depositing User: Mrs. Norazmilah Yaakub
Date Deposited: 01 Oct 2015 08:04
Last Modified: 27 Apr 2016 02:27
URI: https://repo.uum.edu.my/id/eprint/15597

Actions (login required)

View Item View Item