DocumentCode :
464162
Title :
Detecting Stepping-Stone with Chaff Perturbations
Author :
Wu, Han-Ching ; Huang, Shou-Hsuan Stephen
Author_Institution :
Dept. of Comput. Sci., Univ. of Houston, Houston, TX
Volume :
1
fYear :
2007
fDate :
21-23 May 2007
Firstpage :
85
Lastpage :
90
Abstract :
Attackers on the Internet like to indirectly launch network intrusions by using stepping-stones. In this paper, we propose a novel approach to decrease the packet bound by performing a transformation of packet difference of two streams of a host in order to distinguish stepping-stone connections. The adjustment is critical in the case of chaff perturbation by the intruder. Previous work requires the assumption that the total chaff packets be limited by a given number. We replaced the assumption by using a given chaff rate. It is found that after transformation, the bound range is much smaller for attacking connection, resulting in smaller probability of false negative detection.
Keywords :
Internet; probability; random processes; security of data; chaff perturbations; false negative detection; network intrusions; random walk; stepping-stone detection; Computer science; Cryptography; Delay; IP networks; Intrusion detection; Monitoring; Relays; Timing; Watermarking; Wavelet transforms; Chaff Perturbation.; Intrusion Detection; Random Walk; Stepping-stone Detection; Traceback;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on
Conference_Location :
Niagara Falls, Ont.
Print_ISBN :
978-0-7695-2847-2
Type :
conf
DOI :
10.1109/AINAW.2007.151
Filename :
4221040
Link To Document :
بازگشت