DocumentCode :
3429150
Title :
A Survey of Connection-Chains Detection Techniques
Author :
Almulhem, Ahmad ; Traore, Issa
Author_Institution :
Univ. of Victoria, Victoria
fYear :
2007
fDate :
22-24 Aug. 2007
Firstpage :
219
Lastpage :
222
Abstract :
A connection-chain is a set of connections created by sequentially logging into a series of hosts, known as stepping-stones. It provides an effective scheme for attackers to manually interact with a victim machine without disclosing their true origin. The victim will only identify the last host in the chain, while the true origin is hidden behind a series of stepping-stones. Addressing connection-chains poses challenges for researchers in the field of computer security. Accordingly, several approaches have been proposed in the literature. In this paper, we review those approaches and classify them according to a proposed taxonomy.
Keywords :
Internet; security of data; computer security; connection-chains detection techniques; sequentially logging; stepping-stones; taxonomy; Computer crime; Computer hacking; Computer security; Cryptography; Fluid flow measurement; Frequency measurement; Payloads; Performance evaluation; Taxonomy; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, Computers and Signal Processing, 2007. PacRim 2007. IEEE Pacific Rim Conference on
Conference_Location :
Victoria, BC
Print_ISBN :
978-1-4244-1189-4
Electronic_ISBN :
1-4244-1190-4
Type :
conf
DOI :
10.1109/PACRIM.2007.4313215
Filename :
4313215
Link To Document :
بازگشت