An Effective Approach for Stepping-Stone Intrusion Detection Resistant to Intruders’ Chaff-Perturbation via Packet Crossover

Author:

Wang Lixin1,Yang Jianhua1ORCID,Kim Jae1,Wan Peng-Jun2

Affiliation:

1. TSYS School of Computer Science, Columbus State University, Columbus, GA 31907, USA

2. Department of Computer Science, Illinois Institute of Technology, Chicago, IL 60616, USA

Abstract

Today’s intruders usually send attacking commands to a target system through several stepping-stone hosts, for the purpose of decreasing the probability of being caught. Using stepping-stone intrusion (SSI), the intruder’s identity is very difficult to discover as it is concealed by a long interactive connection chain of hosts. An effective approach for SSI detection (SSID) is to determine how many connections are contained in a connection chain. This type of method is called network-based SSID. Most existing network-based SSID only worked for network traffic without intruders’ session manipulation. These known SSID algorithms are either weak to resist intruders’ chaff-perturbation manipulation or have very limited capability in resisting attacker’s session manipulation. This paper develops a novel network-based SSID algorithm resistant to intruders’ chaff-perturbation by using packet crossover. The SSID approach proposed in this paper is simple and easy to implement as the number of packet crossovers can be easily computed. Our proposed algorithm is verified by rigorous technical proofs as well as well-designed network experiments. Our experimental results show that the proposed SSID algorithm works effectively and perfectly in resisting intruders’ chaff-perturbation up to a chaff rate of 50%.

Funder

National Security Agency NCAE-C Research

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference17 articles.

1. Staniford-Chen, S., and Heberlein, L.T. (1995, January 8–10). Holding Intruders Accountable on the Internet. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA.

2. Blum, A., Song, D., and Venkataraman, A.S. (2004, January 15–17). Detection of Interactive Stepping-Stones: Algorithms and Confidence Bounds. Proceedings of the International Symposium on Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, France.

3. Donoho, D.L., Flesia, A.G., Shankar, U., Paxson, V., Coit, J., and Staniford, S. (2002, January 16–18). Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID), Zurich, Switzerland.

4. Zhang, Y., and Paxson, V. (2000, January 14–17). Detecting Stepping-Stones. Proceedings of the 9th USENIX Security Symposium, Denver, CO, USA.

5. Mathew, B. (1995, January 10–13). UNIX security: Threats and solutions. Proceedings of the 1995 System Administration, Networking, and Security Conference, Washington, DC, USA.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3