2002
DOI: 10.1007/3-540-36084-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay

Abstract: Computer attackers frequently relay their attacks through a compromised host at an innocent site, thereby obscuring the true origin of the attack. Previous work has developed ways to detect when an interactive connection into a site and another outbound from the site give evidence of such a "stepping stone." This was done based on monitoring the access link connecting the site to the Internet [7,8].In this paper we anticipate intruder evasion which attempts to defeat such detectors by transforming the stream a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
131
1

Year Published

2008
2008
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 130 publications
(132 citation statements)
references
References 5 publications
0
131
1
Order By: Relevance
“…In fact, this approach is passive traffic analysis, which has extensively been studied in the literature [3,9,25]. Unfortunately, this approach may result in high rates of false detection, especially when the evaluated flows are cross-correlated.…”
Section: Alternative Designsmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, this approach is passive traffic analysis, which has extensively been studied in the literature [3,9,25]. Unfortunately, this approach may result in high rates of false detection, especially when the evaluated flows are cross-correlated.…”
Section: Alternative Designsmentioning
confidence: 99%
“…Early traffic analysis schemes [5,9,20,24,26,28] work in a passive manner, i.e., they record the communication characteristics of incoming flows and correlate them with that of the observed outgoing flows. The right place to do this is often at the border router of an enterprise, so the overhead of this technique is the space used to store the stream characteristics long enough to check against correlated relayed streams, and the CPU time needed to perform the correlations.…”
Section: Related Workmentioning
confidence: 99%
“…There are a few results on detecting encrypted, perturbed steppingstone connections; see [2,7,8]. The key assumption of these approaches is that there is a limit on the attacker's ability to alter the traffic.…”
Section: Related Workmentioning
confidence: 99%
“…The key assumption of these approaches is that there is a limit on the attacker's ability to alter the traffic. Specifically, in [2] it is assumed that there is a maximum tolerable delay for attacking packets, in [7] the attacker's timing perturbation is independent and identically distributed across packets, and in [8] there are constraints not only on the maximum delay, but also on the maximum number of packets that can be sent during the delay. From an algorithmic point of view, Blum, Song and Venkataraman [8] develop the first detection algorithms which require provable (polynomial) sample sizes to achieve certain false alarm probabilities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation