TSYS School Computer Scientists Utilize Network Traffic Distribution to Detect Stepping-Stone Intrusion
A new study by TSYS School computer scientists Jianhua Yang and Lixin Wang explores the use of network traffic distribution to detect stepping-stone intrusion. Appearing in the latest issue of Electronics, the study acknowledges that over the past three decades, stepping-stone intrusion has become a professional and primary way used by intruders to launch their attacks given that it offers protection via a long transmission control protocol connection chain. According to Yang, "Many different algorithms have been proposed to detect stepping-stone intrusion since 1995. But most algorithms cannot resist intruders’ session manipulation. In this paper, we propose a novel approach using the distribution of round-trip time (RTT) of network traffic to detect stepping-stone intrusion." Among the advantages of the approach developed by Yang and Wang are (1) its ability to bring down false-positive detection errors since it belongs to a network-based detection method, (2) its ability to function as intended without having to collect packets from the beginning to the end of establishing a connection chain, (3) its ability to resist intruders’ chaff-perturbation manipulation, and (4) it achievement of a high detection rate.
Comments
Post a Comment