Detecting long connection Chains of interactive terminal sessions

  • Authors:
  • Kwong H. Yung

  • Affiliations:
  • Stanford University Statistics Department, Stanford, CA

  • Venue:
  • RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

To elude detection and capture, hackers chain many computers together to attack the victim computer from a distance. This report proposes a new strategy for detecting suspicious remote sessions, used as part of a long connection chain. Interactive terminal sessions behave differently on long chains than on direct connections. The time gap between a client request and the server delayed acknowledgment estimates the round-trip time to the nearest server. Under the same conditions, the time gap between a client request and the server reply echo provides information on how many hops downstream the final victim is located. By monitoring an outgoing connection for these two time gaps, echo-delay comparison can identify a suspicious session in isolation. Experiments confirm that echo-delay comparison applies to a range of situations and performs especially well in detecting outgoing connections with more than two hops downstream.