Resistance analysis to intruders' evasion of detecting intrusion

  • Authors:
  • Jianhua Yang;Yongzhong Zhang;Shou-Hsuan Stephen Huang

  • Affiliations:
  • Department of Computer Science, University of Houston, Houston, TX;Department of Computer Science, Shanghai TV University, Shanghai, China;Department of Computer Science, University of Houston, Houston, TX

  • Venue:
  • ISC'06 Proceedings of the 9th international conference on Information Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most network intruders launch their attacks through a chain of compromised hosts (stepping-stones) to reduce the risks of being detected or captured. Detecting such kind of attacks is important and difficult because of intruders' evasion to detection, such as time perturbation, and chaff perturbation. In this paper, we propose a clustering algorithm to detect stepping-stone intrusion based on TCP packet round-trip time to estimate the downstream length of an interactive terminal session and give its resistibility to intruders' evasion. The analysis and simulation results show that this algorithm can detect stepping-stone intrusion without false alarm, and low misdetection. It can resist to intruders' time perturbation completely, as well as chaff perturbation to a certain extent.