Detecting backdoor using stepping stone detection approach
Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years,...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/14755/1/14.pdf |
_version_ | 1825803418361397248 |
---|---|
author | Alminshid, Khalid Omar, Mohd Nizam |
author_facet | Alminshid, Khalid Omar, Mohd Nizam |
author_sort | Alminshid, Khalid |
collection | UUM |
description | Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years, SSD was only confined to detect this type of intrusion.This paper discusses the using of SSD approach and potential applications in other emerging field by introduce the using of SSD concepts in backdoor attack detection field.This research shows that by using SSD to detect backdoor attack can be gained very low false negative and false positive rates and reduces the scan process time detection. |
first_indexed | 2024-07-04T05:56:42Z |
format | Conference or Workshop Item |
id | uum-14755 |
institution | Universiti Utara Malaysia |
language | English |
last_indexed | 2024-07-04T05:56:42Z |
publishDate | 2013 |
record_format | eprints |
spelling | uum-147552015-07-09T04:15:25Z https://repo.uum.edu.my/id/eprint/14755/ Detecting backdoor using stepping stone detection approach Alminshid, Khalid Omar, Mohd Nizam QA75 Electronic computers. Computer science Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years, SSD was only confined to detect this type of intrusion.This paper discusses the using of SSD approach and potential applications in other emerging field by introduce the using of SSD concepts in backdoor attack detection field.This research shows that by using SSD to detect backdoor attack can be gained very low false negative and false positive rates and reduces the scan process time detection. 2013-09-23 Conference or Workshop Item PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/14755/1/14.pdf Alminshid, Khalid and Omar, Mohd Nizam (2013) Detecting backdoor using stepping stone detection approach. In: Second International Conference on Informatics and Applications (ICIA),2013, 23-25 Sept. 2013, Lodz. http://doi.org/10.1109/ICoIA.2013.6650235 doi:10.1109/ICoIA.2013.6650235 doi:10.1109/ICoIA.2013.6650235 |
spellingShingle | QA75 Electronic computers. Computer science Alminshid, Khalid Omar, Mohd Nizam Detecting backdoor using stepping stone detection approach |
title | Detecting backdoor using stepping stone detection approach |
title_full | Detecting backdoor using stepping stone detection approach |
title_fullStr | Detecting backdoor using stepping stone detection approach |
title_full_unstemmed | Detecting backdoor using stepping stone detection approach |
title_short | Detecting backdoor using stepping stone detection approach |
title_sort | detecting backdoor using stepping stone detection approach |
topic | QA75 Electronic computers. Computer science |
url | https://repo.uum.edu.my/id/eprint/14755/1/14.pdf |
work_keys_str_mv | AT alminshidkhalid detectingbackdoorusingsteppingstonedetectionapproach AT omarmohdnizam detectingbackdoorusingsteppingstonedetectionapproach |