Skip to main content

TSYS School Researchers Explore New Approach to Stepping-Stone Intrusion Detection

As TSYS School computer scientists Jianhua Yang and Lixin Wang, along with their student Maochang Qin, explain in a new study, hackers usually send attacking commands through compromised hosts, called stepping-stones, for the purpose of decreasing the chance of being discovered. An effective approach for stepping-stone intrusion detection is to estimate the length of a connection chain. This type of detection method is referred to as the network-based stepping-stone intrusion detection. According to Yang, "All of the existing network-based stepping-stone intrusion detection approaches use the distribution of packet round-trip times to estimate the length of a connection chain. Our study explores a novel approach – Fast Fourier Transformation – to analyze the distribution of packet round-trip times." To do so, Yang and his colleagues first capture network packets from different stepping-stones in a connection chain, after which they identify and match the Send and Echo packets in each stepping-stone. Packet round-trip times can be obtained from matched pairs of packets. "We then apply the round-trip time interpolation method to obtain a round-trip time function and finally conduct Fast Fourier Transformation to the round-trip time function in each stepping-stone host. Finally, we conduct a complete Fast Fourier Transformation analysis for the distribution of packet round-trip times and present the Fast Fourier Transformation analysis results in this paper," Yang explained. Yang et al.'s study appears in the latest issue of the Journal of Mobile Networks, Ubiquitous Computing, and Dependable Applications.
 

Comments

Popular posts from this blog

Seven Turner College Management and Marketing Faculty Have Combined to Produce Eight A-Level Journal Publications Between 2021 and the Present

A number of faculty in the Turner College's Department of Management and Marketing, which includes faculty in management information systems, have produced A-level journal publications in the last few years. This report covers that activity, starting with John Finley , the chairperson of the department. Professor Finley published a paper in the Journal of Computer Information Systems in 2022.      Finley is joined by Kirk Heriot , the Crowley Distinguished Chair in Entrepreneurship. Heriot, who earned a PhD in management from Clemson University, published in a 2021 issue of Small Business Economics . One of the study's co-authors, Andres Jauregui of Fresno State University, was previously a member of the Turner College's economics faculty.      Next is Johnny Ho , a professor of management, who has a 2022 publication in the Journal of Computer Information Systems . Ho has won CSU's Excellence in Research Award on multiple occasions, while he has compiled 2...

TSYS School, Jianhua Yang, Lixin Wang Each among Top Five in the World

New research by computer scientists in the School of Information Technology at Universiti Utara Malaysia that ranks institutions and individuals on the basis of scholarship in the area of stepping-stone attacks heaps praise on the Turner College’s TSYS School of Computer Science and two of its faculty – Jianhua Yang and Lixin Wang .   The article, published in the April 2023 issue of the International Journal of Research in Engineering and Science , provides a bibliometric analysis of both publication and citation data from 2000 to September of 2022 related to research on stepping-stone intrusion.   Among several results, it reports that Columbus State University ranks second worldwide, trailing only the University of Houston, using total publications on the subject as the basis of comparison.   A number of other U.S. institutions appear in the top 10, including third-ranked North Carolina State University, fourth-ranked University of Illinois, sixth-ranked Iowa State U...

New Butler Center Report Identifies Employment Gaps in the Columbus Area

Officials in the Turner College's Butler Center for Research and Economic Development recently put the finishing touches on an extensive report on trends in educational programs and occupations in the Columbus area. The report also includes data on business and technology trends.  According to Fady Mansour , Director of the Butler Center, there are several key takeaways from the report regarding 10 occupational gaps that currently exist in the Columbus area. First,  software development occupation exhibits the biggest labor shortage, with the report adding that the TSYS School has a bachelor's degree program in information technology along with a new AI track for the bachelor's degree in computer science, both of which can qualify students for this occupation. Other educational programs are in demand, such as computer programming and cloud computing. Second, there is a gap of 30 employees per year in general and operations management. This gap could be addressed by the Turn...