Detecting stepping-stone intrusion and resisting evasion through TCP/IP packets cross-matching

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we propose a cross-matching algorithm that can detect stepping-stone intrusion. The theoretical analysis of this algorithm shows that it can completely resist intruder's time-jittering evasion. The results of the experiments and the simulation show that this algorithm can also resist intruders' chaff-perturbation with chaff-rate up to 80%. Compared with A. Blum's approach, which can resist chaff-perturbation with every x inserted packets out of 8*(x+1), this approach has promising performance in terms of resistance to intruders' manipulation. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Yang, J., & Lee, B. (2008). Detecting stepping-stone intrusion and resisting evasion through TCP/IP packets cross-matching. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5060 LNCS, pp. 2–12). https://doi.org/10.1007/978-3-540-69295-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free