Openly accessible

Getting the real-time precise round-trip time for stepping stone detection

Li, Ping, Zhou, Wanlei and Wang, Yini 2010, Getting the real-time precise round-trip time for stepping stone detection, in NSS 2010 : Proceedings of the 4th International Conference on Network and System Security, IEEE, Piscataway, N.J., pp. 377-382.

Attached Files
Name Description MIMEType Size Downloads
li-gettingtherealtimeprecise-2010.pdf Published version application/pdf 359.60KB 80

Title Getting the real-time precise round-trip time for stepping stone detection
Author(s) Li, Ping
Zhou, Wanlei
Wang, Yini
Conference name International Conference on Network and System Security (4th : 2010 : Melbourne, Vic.)
Conference location Melbourne, Vic.
Conference dates 1-3 Sep. 2010
Title of proceedings NSS 2010 : Proceedings of the 4th International Conference on Network and System Security
Editor(s) Xiang, Yang
Samarati, Pierangela
Hu, Jiankun
Zhou, Wanlei
Sadeghi, Ahmad-Reza
Publication date 2010
Conference series Network and System Security International Conference
Start page 377
End page 382
Total pages 625 p.
Publisher IEEE
Place of publication Piscataway, N.J.
Summary Stepping stone attacks are often used by network intruders to hide their identities. The Round Trip Times (RTT) between the send packets and corresponding echo packets for the connection chains of stepping stones are critical for detecting such attacks. In this paper, we propose a novel real-time RTT getting algorithm for stepping stones which is based on the estimation of the current RTT value. Our experiments show that it is far more precise than the previous real-time RTT getting algorithms. We also present the probability analysis which shows that our algorithm has a high matching rate and a high accurate rate.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 9780769541594
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890199 Communication Networks and Services not elsewhere classified
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30033641

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 182 Abstract Views, 84 File Downloads  -  Detailed Statistics
Created: Fri, 25 Mar 2011, 13:55:25 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.