A research survey in stepping-stone intrusion detection

Abstract Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using...

Full description

Bibliographic Details
Main Authors: Lixin Wang, Jianhua Yang
Format: Article
Language:English
Published: SpringerOpen 2018-12-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:http://link.springer.com/article/10.1186/s13638-018-1303-2
id doaj-77241764245b4297b0c2275bf32e0079
record_format Article
spelling doaj-77241764245b4297b0c2275bf32e00792020-11-25T00:53:44ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992018-12-012018111510.1186/s13638-018-1303-2A research survey in stepping-stone intrusion detectionLixin Wang0Jianhua Yang1TSYS School of Computer Science, Columbus State UniversityTSYS School of Computer Science, Columbus State UniversityAbstract Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using tools such as telnet, rlogin, or SSH. A benefit of using stepping-stones to launch attacks is that intruders can be hidden by a long interactive session. Since each interactive TCP session between a client and a server is independent of other sessions even though the sessions may be relayed, so accessing a server via multiple relayed TCP sessions can make it much harder to tell the intruder’s geographical location unless all the compromised servers collaborate with each other and work efficiently. Due to such a nature of TCP protocol, the final victim host can only see the traffic from the last session of the connection chain, and it is extremely difficult for the victim host to learn any information about the origin of the attack. This paper provides a research survey in the area of stepping-stone intrusion detection. Most of the significant approaches developed by far for stepping-stone intrusion detection are included in this paper. These detection methods are put into two categories: host-based and network-based (i.e., connection-chain based), according to whether multiple hosts in the connection chain are involved in the design of detection algorithms. In each category, the detection algorithms are divided into several different subsections based on the key techniques used in the algorithms. At the end of the paper, several important and challenging open problems are proposed in this area.http://link.springer.com/article/10.1186/s13638-018-1303-2Stepping-stonesIntrusion detectionConnection chainTCP connectionSensorComputer networks
collection DOAJ
language English
format Article
sources DOAJ
author Lixin Wang
Jianhua Yang
spellingShingle Lixin Wang
Jianhua Yang
A research survey in stepping-stone intrusion detection
EURASIP Journal on Wireless Communications and Networking
Stepping-stones
Intrusion detection
Connection chain
TCP connection
Sensor
Computer networks
author_facet Lixin Wang
Jianhua Yang
author_sort Lixin Wang
title A research survey in stepping-stone intrusion detection
title_short A research survey in stepping-stone intrusion detection
title_full A research survey in stepping-stone intrusion detection
title_fullStr A research survey in stepping-stone intrusion detection
title_full_unstemmed A research survey in stepping-stone intrusion detection
title_sort research survey in stepping-stone intrusion detection
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1499
publishDate 2018-12-01
description Abstract Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using tools such as telnet, rlogin, or SSH. A benefit of using stepping-stones to launch attacks is that intruders can be hidden by a long interactive session. Since each interactive TCP session between a client and a server is independent of other sessions even though the sessions may be relayed, so accessing a server via multiple relayed TCP sessions can make it much harder to tell the intruder’s geographical location unless all the compromised servers collaborate with each other and work efficiently. Due to such a nature of TCP protocol, the final victim host can only see the traffic from the last session of the connection chain, and it is extremely difficult for the victim host to learn any information about the origin of the attack. This paper provides a research survey in the area of stepping-stone intrusion detection. Most of the significant approaches developed by far for stepping-stone intrusion detection are included in this paper. These detection methods are put into two categories: host-based and network-based (i.e., connection-chain based), according to whether multiple hosts in the connection chain are involved in the design of detection algorithms. In each category, the detection algorithms are divided into several different subsections based on the key techniques used in the algorithms. At the end of the paper, several important and challenging open problems are proposed in this area.
topic Stepping-stones
Intrusion detection
Connection chain
TCP connection
Sensor
Computer networks
url http://link.springer.com/article/10.1186/s13638-018-1303-2
work_keys_str_mv AT lixinwang aresearchsurveyinsteppingstoneintrusiondetection
AT jianhuayang aresearchsurveyinsteppingstoneintrusiondetection
AT lixinwang researchsurveyinsteppingstoneintrusiondetection
AT jianhuayang researchsurveyinsteppingstoneintrusiondetection
_version_ 1725236727888478208