To reduce the likelihood of detection, modern-day hackers usually send attacking commands to a target system through several stepping-stone hosts. Such stepping-stone intrusion conceals the intruder’s identity behind a long interactive connection chain of hosts. An effective approach for stepping-stone intrusion detection is to determine how many connections are contained in a connection chain. This type of defense is called network-based stepping-stone intrusion detection. A new study by TSYS School faculty Lixin Wang, Jianhua Yang, and their student Jae Kim, along with Peng-Jun Wan of the Illinois Institute of Technology, explains that most existing network-based stepping-stone intrusion detection approaches work only for network traffic without intruders’ session manipulation. As they explain, the known network-based stepping-stone intrusion detection algorithms are either too weak to resist intruders’ chaff-perturbation manipulation or have very limited capability in resisting attacker’s session manipulation. In response, their paper, which appears in a recent issue of Electronics, develops a novel network-based stepping-stone intrusion detection algorithm that is resistant to intruders’ chaff-perturbation by using packet crossover. The network-based stepping-stone intrusion detection approach proposed by Wang et al. is easy to implement and verified by rigorous technical proofs and well-designed network experiments. The experimental results presented and discussed in the study show that the proposed network-based stepping-stone intrusion detection algorithm works to resist intruders’ chaff-perturbation up to a chaff rate of 50%.
Seven Turner College Management and Marketing Faculty Have Combined to Produce Eight A-Level Journal Publications Between 2021 and the Present
A number of faculty in the Turner College's Department of Management and Marketing, which includes faculty in management information systems, have produced A-level journal publications in the last few years. This report covers that activity, starting with John Finley , the chairperson of the department. Professor Finley published a paper in the Journal of Computer Information Systems in 2022. Finley is joined by Kirk Heriot , the Crowley Distinguished Chair in Entrepreneurship. Heriot, who earned a PhD in management from Clemson University, published in a 2021 issue of Small Business Economics . One of the study's co-authors, Andres Jauregui of Fresno State University, was previously a member of the Turner College's economics faculty. Next is Johnny Ho , a professor of management, who has a 2022 publication in the Journal of Computer Information Systems . Ho has won CSU's Excellence in Research Award on multiple occasions, while he has compiled 2...

Comments
Post a Comment