The Optimization Of Stepping Stone Detection: Packet Capturing Steps

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dropped Packet Problems in Stepping Stone Detection Method

This paper discusses one of the issues that are not covered by current stepping stone detection based researches. Although dropped packet problems are well-known problem in real network environment, all of the stepping stone detection researches just assume that dropped packet problems do not occur. Stepping stone detection research already in complex condition where each enhancement of the res...

متن کامل

Robust Detection of Stepping-stone Attacks

The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order. Based on the assumption that packet arrivals form renewal processes, and a pair of such renewal processes is also renewal, a nonparametric detector is proposed to detect attacking traffic by testin...

متن کامل

Intelligent Network-Based Stepping Stone Detection Approach

This research intends to introduce a new usage of Artificial Intelligent (AI) approaches in Stepping Stone Detection (SSD) fields of research. By using Self-Organizing Map (SOM) approaches as the engine, through the experiment, it is shown that SOM has the capability to detect the number of connection chains that involved in a stepping stones. Realizing that by counting the number of connection...

متن کامل

Design Issues in Stepping Stone Detection

In the rapid changing inter-connected environment, cyber criminals are opting sophisticated tools to hide their identities and locations. Stepping stones are now popular among the miscreants and making the situations worse. The paper details the role of stepping stones in hiding the cyber criminals and highlights it as challenge to differentiate the stepping stones from legitimate computers in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Teknologi

سال: 2006

ISSN: 2180-3722,0127-9696

DOI: 10.11113/jt.v44.371