Matching connection pairs

  • Authors:
  • Hyung Woo Kang;Soon Jwa Hong;Dong Hoon Lee

  • Affiliations:
  • National Security Research Institute, Daejeon, Korea;National Security Research Institute, Daejeon, Korea;Center for Information Security Technologies(CIST), Korea University, Seoul, Korea

  • Venue:
  • PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

When an intruder launches attack not from their own computer but from intermediate hosts that they previously compromised, these intermediate hosts are called stepping-stones. In this paper, we describe an algorithm to be able to detect stepping-stones in detoured attacks. Our aim is to develop an algorithm that can trace an origin system which attacks a victim system via stepping-stones. There are two kinds of traceback technologies: IP packet traceback and connection traceback. We focused on connection traceback in this paper and proposed a new intruder tracing algorithm to distinguish between an origin system of attack and stepping-stones using process structures of operating systems.