Abstract
Today, the most common way to perform various attacks is to use stepping stone hosts in the attacking path. In stepping stone attacks, attacker creates a long chain of connections via intermediary previously compromised nodes, to execute attack. The only way to break this chain is to detect stepping stones and applying some security constraints on the traffic flowing through them, not to allow malicious traffic through them. In this paper, we present classification and state-of-the-art of existing schemes proposed for stepping stone detection in recent past. Moreover, we compare these techniques based on their merits and demerits, and discuss open issues and challenges that can be used for further research in this domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Srivastava, A., Gupta, B.B., Tyagi, A., Sharma, A., Mishra, A.: A recent survey on DDoS attacks and defense mechanisms. In: Book on Advances in Parallel Distributed Computing, pp. 570-580. Springer (2011)
He, T., et al.: Packet scheduling against stepping-stone attacks with chaff. In: the proceeding of 25th IEEE Military Communications Conference (MILCOM), pp. 1–7 (2006)
Zhang, Y., Paxson, V.: Detecting stepping-stones. In: Proceedings of the 9th USENIX Security Symposium, pp. 67–81. Denver, CO, Aug 2000
Hsiao, H., Fan, W.-C.: Detecting step stone with network traffic mining approach. In: the proceeding of 4th IEEE Conference on Innovative Computing, Information and Control (ICICIC), pp. 1176—1179 (2009)
He, T., Tong, L.: Signal processing perspective to stepping stone detection. In: proceeding of 40th IEEE Annual Conference on Information Sciences and Systems, (CISS), pp. 687–692 (2006)
Gupta, B.B., Joshi, R.C., Misra, M.: Defending against distributed denial of service attacks: issues and challenges. Inf. Secur. J. Global Perspect. 18(5), 224–247 (2009)
Staniford-Chen, S., Heberlein, L.T.: Holding intruders accountable on the internet. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 39-49. Oakland, CA (1995)
He, T., Tong, L.: Detecting encrypted stepping-stone connections. IEEE Trans. signal process. 55(5), 1612–1623 (2007)
Yang, J., Huang, S.-H.S.: Mining TCP/IP packets to detect stepping stone intrusion. Comput. Secur. 26(7–8), 479–484 (2007)
yang, J., Woolbright, D.: Correlating TCP/IP packet context to detect stepping stone intrusion. Comput. Secur. 30(4), 538–546 (2011)
Wu, H., Stephen Huang, S.-H.: Stepping stone intrusion detection using neural networks approach. J. Expert Syst. Appl. 37(2), 431–1437, Mar 2010
Omar, M.N., et al.: A stepping stone perspective to detection of network threats. Int. J. Appl. Math. Inf. 7(3), 97–106 (2013)
Omar, M.N. et al.: Hybrid stepping stone detection method. In: the Proceeding of 1st IEEE Conference on Distributed Framework and Applications (DFmA—2008), pp. 134–138 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Rahul Kumar, Gupta, B.B. (2016). Stepping Stone Detection Techniques: Classification and State-of-the-Art. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_59
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_59
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)