DocumentCode
464162
Title
Detecting Stepping-Stone with Chaff Perturbations
Author
Wu, Han-Ching ; Huang, Shou-Hsuan Stephen
Author_Institution
Dept. of Comput. Sci., Univ. of Houston, Houston, TX
Volume
1
fYear
2007
fDate
21-23 May 2007
Firstpage
85
Lastpage
90
Abstract
Attackers on the Internet like to indirectly launch network intrusions by using stepping-stones. In this paper, we propose a novel approach to decrease the packet bound by performing a transformation of packet difference of two streams of a host in order to distinguish stepping-stone connections. The adjustment is critical in the case of chaff perturbation by the intruder. Previous work requires the assumption that the total chaff packets be limited by a given number. We replaced the assumption by using a given chaff rate. It is found that after transformation, the bound range is much smaller for attacking connection, resulting in smaller probability of false negative detection.
Keywords
Internet; probability; random processes; security of data; chaff perturbations; false negative detection; network intrusions; random walk; stepping-stone detection; Computer science; Cryptography; Delay; IP networks; Intrusion detection; Monitoring; Relays; Timing; Watermarking; Wavelet transforms; Chaff Perturbation.; Intrusion Detection; Random Walk; Stepping-stone Detection; Traceback;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on
Conference_Location
Niagara Falls, Ont.
Print_ISBN
978-0-7695-2847-2
Type
conf
DOI
10.1109/AINAW.2007.151
Filename
4221040
Link To Document