2007
DOI: 10.1016/j.cose.2007.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Mining TCP/IP packets to detect stepping-stone intrusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
65
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(65 citation statements)
references
References 3 publications
0
65
0
Order By: Relevance
“…Yang et al . used the maximum–minimum distance classification method to cluster and simplify the RTT value and chose the higher clustering rates. This classification method has more accurate results than the original RTT.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Yang et al . used the maximum–minimum distance classification method to cluster and simplify the RTT value and chose the higher clustering rates. This classification method has more accurate results than the original RTT.…”
Section: Related Workmentioning
confidence: 99%
“…Most of detecting stepping-stone attack studies included content-based thumbprint [4,5], time-based approach [6][7][8][9][10][11][12], deviation-based approach [13], packet number differencebased [14,15], context-based packet matching [16,17], and round-trip time (RTT) approach [18][19][20][21][22][23][24]. There were generally two types of detecting method.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, Yung's estimating approach for connection chain length can only give good results when network traffic is relatively uniform. On the other hand, Yang and Huang [3] proposed a "Step-Function" approach to detect stepping stones using the RTT feature that RTT changes small for normal connections, but this change, proportionally increases with the number of stepping stones in the chain. The number of steps for RTT changes reflects the number of hosts in the connections.…”
Section: Introductionmentioning
confidence: 99%
“…Understanding the potential threats of an organization and assessing the risks associated with those threats Educating personnel in security awareness, code of conduct, and information security best practices Establishing policies and procedures to protect information assets from intentional or accidental misuse or loss Establishing policies and procedures to mitigate loss should security breaches occur Implementing and monitoring technologies to prevent or mitigate the loss from present or future security breaches Continuous assessment of technology, policies and procedures, and personnel to assure proper governance of information security issues Incorporating information security governance as an important part of corporate governance Prior research on computer security has concentrated mostly on either identifying security as a socio-philosophical concern [Ratnasingham 1998], a socio-organizational concern [Dhillon and Backhouse 2001], or as a purely technical issue [Bass 2000;Wong et al 2000;Li and Guo 2007;Yang and Huang 2007;]. Such delineation has possibly led to a situation where security is widely regarded as a field which lacks comprehensive research in IS [Paulson 2002;Kotulic and Clark 2004].…”
Section: Introductionmentioning
confidence: 99%