Record Details

A SURVEY OF RESEARCH IN STEPPING-STONE DETECTION

International Journal of Electronic Commerce Studies

View Archive Info
 
 
Field Value
 
Title A SURVEY OF RESEARCH IN STEPPING-STONE DETECTION
 
Creator Shullich, Robert
Chu, Jie
Ji, Ping
Chen, Weifeng
 
Subject Network Security; Intrusion Detection; Stepping-Stone; Connection Chain; Chaff; Watermarking; Information Flow Detection; Flow Correlation; Stepping-Stone Intrusion
 
Description Stepping-stone is a method that directs network connections from an attacker to a victim through one or more intermediate compromised systems or devices. The objective of this scheme is to hide the attacker’s identity (provide anonymity) and make traceback either difficult or impossible. Evasion techniques that are used to hide this process include encryption, introduction of dummy packets (chaff) into the stream, introducing delay into the timing of the packet stream, using multiple compromised hosts in long connection chains (many hops), and intermixing command and control traffic with multimedia traffic to mask traffic characteristics. This paper provides a survey that focuses on characteristic based, interactive stepping-stone detection and analysis techniques. An overview of the field of research is presented with critique of some of the methods used. We also provide some interesting topics for additional research.
 
Publisher Academy of Taiwan Information Systems Research
 
Date 2011-12-12
 
Type info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion

 
Format application/pdf
 
Identifier http://academic-pub.org/ojs/index.php/ijecs/article/view/972
 
Source International Journal of Electronic Commerce Studies; Vol 2, No 2 (2011); 103-126
2073-9729
 
Language eng
 
Relation http://academic-pub.org/ojs/index.php/ijecs/article/view/972/114
 
Rights Copyright (c) 2014 International Journal of Electronic Commerce Studies