Detecting backdoor using stepping stone detection approach

Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years,...

Full description

Bibliographic Details
Main Authors: Alminshid, Khalid, Omar, Mohd Nizam
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/14755/1/14.pdf
_version_ 1825803418361397248
author Alminshid, Khalid
Omar, Mohd Nizam
author_facet Alminshid, Khalid
Omar, Mohd Nizam
author_sort Alminshid, Khalid
collection UUM
description Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years, SSD was only confined to detect this type of intrusion.This paper discusses the using of SSD approach and potential applications in other emerging field by introduce the using of SSD concepts in backdoor attack detection field.This research shows that by using SSD to detect backdoor attack can be gained very low false negative and false positive rates and reduces the scan process time detection.
first_indexed 2024-07-04T05:56:42Z
format Conference or Workshop Item
id uum-14755
institution Universiti Utara Malaysia
language English
last_indexed 2024-07-04T05:56:42Z
publishDate 2013
record_format eprints
spelling uum-147552015-07-09T04:15:25Z https://repo.uum.edu.my/id/eprint/14755/ Detecting backdoor using stepping stone detection approach Alminshid, Khalid Omar, Mohd Nizam QA75 Electronic computers. Computer science Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years, SSD was only confined to detect this type of intrusion.This paper discusses the using of SSD approach and potential applications in other emerging field by introduce the using of SSD concepts in backdoor attack detection field.This research shows that by using SSD to detect backdoor attack can be gained very low false negative and false positive rates and reduces the scan process time detection. 2013-09-23 Conference or Workshop Item PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/14755/1/14.pdf Alminshid, Khalid and Omar, Mohd Nizam (2013) Detecting backdoor using stepping stone detection approach. In: Second International Conference on Informatics and Applications (ICIA),2013, 23-25 Sept. 2013, Lodz. http://doi.org/10.1109/ICoIA.2013.6650235 doi:10.1109/ICoIA.2013.6650235 doi:10.1109/ICoIA.2013.6650235
spellingShingle QA75 Electronic computers. Computer science
Alminshid, Khalid
Omar, Mohd Nizam
Detecting backdoor using stepping stone detection approach
title Detecting backdoor using stepping stone detection approach
title_full Detecting backdoor using stepping stone detection approach
title_fullStr Detecting backdoor using stepping stone detection approach
title_full_unstemmed Detecting backdoor using stepping stone detection approach
title_short Detecting backdoor using stepping stone detection approach
title_sort detecting backdoor using stepping stone detection approach
topic QA75 Electronic computers. Computer science
url https://repo.uum.edu.my/id/eprint/14755/1/14.pdf
work_keys_str_mv AT alminshidkhalid detectingbackdoorusingsteppingstonedetectionapproach
AT omarmohdnizam detectingbackdoorusingsteppingstonedetectionapproach