Stepping-stone detection technique for recognizing legitimate and attack connections
A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify...
Main Authors: | Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/15597/1/PID189.pdf |
Similar Items
-
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011) -
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006) -
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006) -
Detecting backdoor using stepping stone detection approach
by: Alminshid, Khalid, et al.
Published: (2013) -
A stepping stone perspective to detection of network threats
by: Omar, Mohd Nizam, et al.
Published: (2013)