Effective algorithms to detect stepping-stone intrusion by removing outliers of packet RTTs
نویسندگان
چکیده
An effective method to detect stepping-stone intrusion (SSI) is estimate the length of a connection chain. This type detection referred as network-based approach. Existing SSI methods are either ineffective in context Internet because presence outliers packet round-trip times (RTTs) or inefficient, many packets must be captured and processed. Because high fluctuation caused by intermediate routers on Internet, it unavoidable that RTTs contain outlier values. In this paper, we first propose an efficient algorithm eliminate most possible RTT environment. We then develop mining network traffic using improved version k-Means clustering. Our proposed for accurate, effective, Internet. Well-designed experiments conducted environment verify effectiveness, correctness, efficiency our algorithms. show rate higher than 85.7%
منابع مشابه
Matching TCP/IP Packets to Detect Stepping-Stone Intrusion
We propose a “Step-Function” method to detect network attackers from using a long connection chain to hide their identities when they launch attacks. The objective of the method is to estimate the length of a connection chain based on the changes in packet round trip times. The key point to compute the round trip time of a connection chain is to match a Send and its corresponding Echo packet. W...
متن کاملModeling and Detecting Stepping-Stone Intrusion
Most network intruders launch their attacks through steppingstones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical way is to compare an incoming connection with an outgoing connection to determine if a computer is used as stepping-stone. In this paper, we present four models to describe stepping-stone intrusion. We also propose the i...
متن کاملDropped Packet Problems in Stepping Stone Detection Method
This paper discusses one of the issues that are not covered by current stepping stone detection based researches. Although dropped packet problems are well-known problem in real network environment, all of the stepping stone detection researches just assume that dropped packet problems do not occur. Stepping stone detection research already in complex condition where each enhancement of the res...
متن کاملRobustifying Eeg Data Analysis by Removing Outliers
Biomedical signals such as EEG are typically contaminated by measurement artifacts, outliers and non-standard noise sources. We propose to use techniques from robust statistics and machine learning to reduce the influence of such distortions. Two showcase application scenarios are studied: (a) Lateralized Readiness Potential (LRP) analysis, where we show that a robust treatment of the EEG allow...
متن کاملA Stepping Stone to Pluripotency
Somatic cells can be reprogrammed into pluripotent stem cells via either expression of transcription factors or addition of small molecule chemicals only. Zhao et al. reveal a unique intermediate state during chemical reprogramming allowing a significant improvement in its efficiency and kinetics.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tsinghua Science & Technology
سال: 2022
ISSN: ['1878-7606', '1007-0214']
DOI: https://doi.org/10.26599/tst.2021.9010041