Openly accessible

A quick-response real-time stepping stone detection scheme

Li, Ping, Zhou, Wanlei and Yu, Yanli 2010, A quick-response real-time stepping stone detection scheme, in HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, IEEE, Piscataway, N.J., pp. 677-682.

Attached Files
Name Description MIMEType Size Downloads
zhou-aquick-2010.pdf Published version application/pdf 317.36KB 103

Title A quick-response real-time stepping stone detection scheme
Author(s) Li, Ping
Zhou, Wanlei
Yu, Yanli
Conference name IEEE International Conference on High Performance Computing and Communications (12th : 2010 : Melbourne, Vic.)
Conference location Melbourne, Vic.
Conference dates 1-3 Sep. 2010
Title of proceedings HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications
Editor(s) [Unknown]
Publication date 2010
Conference series International Conference on High Performance Computing and Communications
Start page 677
End page 682
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Summary Stepping stone attacks are often used by network intruders to hide their identities. To detect and block stepping stone attacks, a stepping stone detection scheme should be able to correctly identify a stepping-stone in a very short time and in real-time. However, the majority of past research has failed to indicate how long or how many packets it takes for the monitor to detect a stepping stone. In this paper, we propose a novel quick-response real-time stepping stones detection scheme which is based on packet delay properties. Our experiments show that it can identify a stepping stone within 20 seconds which includes false positives and false negatives of less than 3%.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 076954214X
9780769542140
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890199 Communication Networks and Services not elsewhere classified
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30033639

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 190 Abstract Views, 108 File Downloads  -  Detailed Statistics
Created: Fri, 25 Mar 2011, 11:38:05 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.