Intelligent Network-Based Stepping Stone Detection Approach

نویسندگان

  • Nizam Omar
  • Rahmat Budiarto
چکیده

This research intends to introduce a new usage of Artificial Intelligent (AI) approaches in Stepping Stone Detection (SSD) fields of research. By using Self-Organizing Map (SOM) approaches as the engine, through the experiment, it is shown that SOM has the capability to detect the number of connection chains that involved in a stepping stones. Realizing that by counting the number of connection chain is one of the important steps of stepping stone detection and it become the research focus currently, this research has chosen SOM as the AI techniques because of its capabilities. Through the experiment, it is shown that SOM can detect the number of involved connection chains in Network-based Stepping Stone Detection (NSSD). Keywords— Artificial Intelligent, Self-Organizing Map (SOM), Stepping Stone Detection, Tracing Intruder.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent Host - based Stepping Stone Detection Approach Mohd

This paper intends to introduce an implementation of a novel Self-Organization Map (SOM) in Host-based Stepping Stone Detection (SSD). Previous works have introduced Artificial Intelligence (AI) approaches such as Artificial Neural Network (ANN), however we found that the approaches are complex due to the requirement of variable to be known and tested to detect a stepping stone. SOM provides un...

متن کامل

Stepping-stone Detection Technique Forrecognizing Legitimate and Attack Connections

A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious. This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections. Stepping-stone connections are identifi...

متن کامل

Dropped Packet Problems in Stepping Stone Detection Method

This paper discusses one of the issues that are not covered by current stepping stone detection based researches. Although dropped packet problems are well-known problem in real network environment, all of the stepping stone detection researches just assume that dropped packet problems do not occur. Stepping stone detection research already in complex condition where each enhancement of the res...

متن کامل

Detection of Interactive Stepping Stones: Algorithms and Conndence Bounds

Intruders on the Internet often prefer to launch network intrusions indirectly, i.e., using a chain of hosts on the Internet as relay machines using protocols such as Telnet or SSH. This type of attack is called a stepping-stone attack. In this paper, we propose and analyze algorithms for stepping-stone detection using ideas from Computational Learning Theory and the analysis of random walks. O...

متن کامل

Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds

Intruders on the Internet often prefer to launch network intrusions indirectly, i.e., using a chain of hosts on the Internet as relay machines using protocols such as Telnet or SSH. This type of attack is called a stepping-stone attack. In this paper, we propose and analyze algorithms for stepping-stone detection using ideas from Computational Learning Theory and the analysis of random walks. O...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009