Today network intrusions are usually launched by attackers
through compromised hosts, called stepping-stones, in order to minimize the
chance of being detected. This book chapter presents the most recent research
advances in the area of stepping-stone intrusion detection. All the important
and significant methods proposed in recent years for stepping-stone intrusion
detection are discussed and summarized in this book chapter. The two key
techniques used for stepping-stone intrusion detection in recent years are
packet matching and packet crossover. Both the packet matching-based detection
methods and the packet crossover-based detection algorithms are presented and
discussed. In addition to these two categories, other important detection
algorithms for stepping-stone intrusion in recent years are also included and
discussed. Finally, some important and challenging open problems are presented
in this book chapter.
Author(s) Details:
Lixin Wang,
TSYS School of Computer Science, Columbus State University, Columbus,
GA 31907, USA.
Jianhua Yang,
TSYS School
of Computer Science, Columbus State University, Columbus, GA 31907, USA.
Please see the link here: https://stm.bookpi.org/CPSTR-V7/article/view/13747
No comments:
Post a Comment