• DocumentCode
    464162
  • Title

    Detecting Stepping-Stone with Chaff Perturbations

  • Author

    Wu, Han-Ching ; Huang, Shou-Hsuan Stephen

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Houston, Houston, TX
  • Volume
    1
  • fYear
    2007
  • fDate
    21-23 May 2007
  • Firstpage
    85
  • Lastpage
    90
  • Abstract
    Attackers on the Internet like to indirectly launch network intrusions by using stepping-stones. In this paper, we propose a novel approach to decrease the packet bound by performing a transformation of packet difference of two streams of a host in order to distinguish stepping-stone connections. The adjustment is critical in the case of chaff perturbation by the intruder. Previous work requires the assumption that the total chaff packets be limited by a given number. We replaced the assumption by using a given chaff rate. It is found that after transformation, the bound range is much smaller for attacking connection, resulting in smaller probability of false negative detection.
  • Keywords
    Internet; probability; random processes; security of data; chaff perturbations; false negative detection; network intrusions; random walk; stepping-stone detection; Computer science; Cryptography; Delay; IP networks; Intrusion detection; Monitoring; Relays; Timing; Watermarking; Wavelet transforms; Chaff Perturbation.; Intrusion Detection; Random Walk; Stepping-stone Detection; Traceback;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on
  • Conference_Location
    Niagara Falls, Ont.
  • Print_ISBN
    978-0-7695-2847-2
  • Type

    conf

  • DOI
    10.1109/AINAW.2007.151
  • Filename
    4221040