Skip to main content

TSYS School Faculty and Student Publish Study on Network-Based Stepping-Stone Intrusion Detection

To reduce the likelihood of detection, modern-day hackers usually send attacking commands to a target system through several stepping-stone hosts. Such stepping-stone intrusion conceals the intruder’s identity behind a long interactive connection chain of hosts. An effective approach for stepping-stone intrusion detection is to determine how many connections are contained in a connection chain. This type of defense is called network-based stepping-stone intrusion detectionA new study by TSYS School faculty Lixin WangJianhua Yang, and their student Jae Kim, along with Peng-Jun Wan of the Illinois Institute of Technology, explains that most existing network-based stepping-stone intrusion detection approaches work only for network traffic without intruders’ session manipulation. As they explain, the known network-based stepping-stone intrusion detection algorithms are either too weak to resist intruders’ chaff-perturbation manipulation or have very limited capability in resisting attacker’s session manipulation. In response, their paper, which appears in a recent issue of Electronics, develops a novel network-based stepping-stone intrusion detection algorithm that is resistant to intruders’ chaff-perturbation by using packet crossover. The network-based stepping-stone intrusion detection approach proposed by Wang et al. is easy to implement and verified by rigorous technical proofs and well-designed network experiments. The experimental results presented and discussed in the study show that the proposed network-based stepping-stone intrusion detection algorithm works to resist intruders’ chaff-perturbation up to a chaff rate of 50%.

Comments

Popular posts from this blog

Seven Turner College Management and Marketing Faculty Have Combined to Produce Eight A-Level Journal Publications Between 2021 and the Present

A number of faculty in the Turner College's Department of Management and Marketing, which includes faculty in management information systems, have produced A-level journal publications in the last few years. This report covers that activity, starting with John Finley , the chairperson of the department. Professor Finley published a paper in the Journal of Computer Information Systems in 2022.      Finley is joined by Kirk Heriot , the Crowley Distinguished Chair in Entrepreneurship. Heriot, who earned a PhD in management from Clemson University, published in a 2021 issue of Small Business Economics . One of the study's co-authors, Andres Jauregui of Fresno State University, was previously a member of the Turner College's economics faculty.      Next is Johnny Ho , a professor of management, who has a 2022 publication in the Journal of Computer Information Systems . Ho has won CSU's Excellence in Research Award on multiple occasions, while he has compiled 2...

TSYS School, Jianhua Yang, Lixin Wang Each among Top Five in the World

New research by computer scientists in the School of Information Technology at Universiti Utara Malaysia that ranks institutions and individuals on the basis of scholarship in the area of stepping-stone attacks heaps praise on the Turner College’s TSYS School of Computer Science and two of its faculty – Jianhua Yang and Lixin Wang .   The article, published in the April 2023 issue of the International Journal of Research in Engineering and Science , provides a bibliometric analysis of both publication and citation data from 2000 to September of 2022 related to research on stepping-stone intrusion.   Among several results, it reports that Columbus State University ranks second worldwide, trailing only the University of Houston, using total publications on the subject as the basis of comparison.   A number of other U.S. institutions appear in the top 10, including third-ranked North Carolina State University, fourth-ranked University of Illinois, sixth-ranked Iowa State U...

New Butler Center Report Identifies Employment Gaps in the Columbus Area

Officials in the Turner College's Butler Center for Research and Economic Development recently put the finishing touches on an extensive report on trends in educational programs and occupations in the Columbus area. The report also includes data on business and technology trends.  According to Fady Mansour , Director of the Butler Center, there are several key takeaways from the report regarding 10 occupational gaps that currently exist in the Columbus area. First,  software development occupation exhibits the biggest labor shortage, with the report adding that the TSYS School has a bachelor's degree program in information technology along with a new AI track for the bachelor's degree in computer science, both of which can qualify students for this occupation. Other educational programs are in demand, such as computer programming and cloud computing. Second, there is a gap of 30 employees per year in general and operations management. This gap could be addressed by the Turn...