Title :
A Survey of Connection-Chains Detection Techniques
Author :
Almulhem, Ahmad ; Traore, Issa
Author_Institution :
Univ. of Victoria, Victoria
Abstract :
A connection-chain is a set of connections created by sequentially logging into a series of hosts, known as stepping-stones. It provides an effective scheme for attackers to manually interact with a victim machine without disclosing their true origin. The victim will only identify the last host in the chain, while the true origin is hidden behind a series of stepping-stones. Addressing connection-chains poses challenges for researchers in the field of computer security. Accordingly, several approaches have been proposed in the literature. In this paper, we review those approaches and classify them according to a proposed taxonomy.
Keywords :
Internet; security of data; computer security; connection-chains detection techniques; sequentially logging; stepping-stones; taxonomy; Computer crime; Computer hacking; Computer security; Cryptography; Fluid flow measurement; Frequency measurement; Payloads; Performance evaluation; Taxonomy; Timing;
Conference_Titel :
Communications, Computers and Signal Processing, 2007. PacRim 2007. IEEE Pacific Rim Conference on
Conference_Location :
Victoria, BC
Print_ISBN :
978-1-4244-1189-4
Electronic_ISBN :
1-4244-1190-4
DOI :
10.1109/PACRIM.2007.4313215