TSYS School computer science professors Jianhua Yang and Lixin Wang recently teamed with CSU computer science student Noah Neundorfer to develop a novel approach to detect stepping-stone intrusion by modelling and identifying encrypted network traffic of a host.As their new study, which appears in a recent issue of the Journal of Internet Services and Information Security, explains, attackers commonly use Secure Shell (SSH), which securely connects two hosts together and encrypts their interactions, to hide their identity.
As this process plays out, one connection of SSH leads to another on a different host, and over again until the attacker becomes untraceable from a victim host. Prior investigations into detecting a stepping-stone intrusion have assumed that the encryption algorithm used for encryptions would remain the same. These TSYS School researchers instead focus on the length sequences of incoming and outgoing packets under heterogeneous encryption algorithms in order to determine if a host is used as a stepping-stone. Testing their algorithm using Internet-based experiments produced an average match rate for relayed connections in the range of 94% to 96%.
Pretty nice post. I recently stumbled upon your blog and wished to state that I’ve actually appreciated searching your blog content. After all I will be registering to your own nourish and i also we imagine you compose once more quickly! find more info
ReplyDelete