A research survey in stepping-stone intrusion detection

Abstract Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as relay machines and remotely log in these hosts using...

Full description

Bibliographic Details
Main Authors: Lixin Wang, Jianhua Yang
Format: Article
Language:English
Published: SpringerOpen 2018-12-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:http://link.springer.com/article/10.1186/s13638-018-1303-2