Detecting stepping stones by abnormal causality probability


Autoria(s): Wen, Sheng; Wu, Di; Li, Ping; Xiang, Yang; Zhou, Wanlei; Wei, Guiyi
Data(s)

01/07/2015

Resumo

Locating the real source of the Internet attacks has long been an important but difficult problem to be addressed. In the real world, attackers can easily hide their identities and evade punishment by relaying their attacks through a series of compromised systems or devices called stepping stones. Currently, researchers mainly use similar features from the network traffic, such as packet timestamps and frequencies, to detect stepping stones. However, these features can be easily destroyed by attackers using evasive techniques. In addition, it is also difficult to implement an appropriate threshold of similarity that can help justify the stepping stones. In order to counter these problems, in this paper, we introduce the consistent causality probability to detect the stepping stones. We formulate the ranges of abnormal causality probabilities according to the different network conditions, and on the basis of it, we further implement to self-adaptive methods to capture stepping stones. To evaluate our proposed detection methods, we adopt theoretic analysis and empirical studies, which demonstrate accuracy of the abnormal causality probability. Moreover, we compare our proposed methods with previous works. The result shows that our methods in this paper significantly outperform previous works in the accuracy of detection malicious stepping stones, even when evasive techniques are adopted by attackers.

Identificador

http://hdl.handle.net/10536/DRO/DU:30077749

Idioma(s)

eng

Publicador

Wiley

Relação

http://dro.deakin.edu.au/eserv/DU:30077749/wen-detectingstepping-2015.pdf

http://www.dx.doi.org/10.1002/sec.1037

Direitos

2015, Wiley

Palavras-Chave #Science & Technology #Technology #Computer Science, Information Systems #Telecommunications #Computer Science #intrusion detection #causality probability #stepping stones
Tipo

Journal Article