Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching

  • Authors:
  • Jianhua Yang;Byong Lee

  • Affiliations:
  • Department of Mathematics & Computer Science, Bennett College for Women, Greensboro, USA NC 27401;Department of Mathematics & Computer Science, Bennett College for Women, Greensboro, USA NC 27401

  • Venue:
  • ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose a cross-matching algorithm that can detect stepping-stone intrusion. The theoretical analysis of this algorithm shows that it can completely resist intruder's time-jittering evasion. The results of the experiments and the simulation show that this algorithm can also resist intruders' chaff-perturbation with chaff-rate up to 80%. Compared with A. Blum's approach, which can resist chaff-perturbation with every x inserted packets out of 8*(x+1), this approach has promising performance in terms of resistance to intruders' manipulation.