Saturday, 30 March 2024

Most Recent Advances in Stepping-stone Intrusion | Chapter 10 | Contemporary Perspective on Science, Technology and Research Vol. 7

Today network intrusions are usually launched by attackers through compromised hosts, called stepping-stones, in order to minimize the chance of being detected. This book chapter presents the most recent research advances in the area of stepping-stone intrusion detection. All the important and significant methods proposed in recent years for stepping-stone intrusion detection are discussed and summarized in this book chapter. The two key techniques used for stepping-stone intrusion detection in recent years are packet matching and packet crossover. Both the packet matching-based detection methods and the packet crossover-based detection algorithms are presented and discussed. In addition to these two categories, other important detection algorithms for stepping-stone intrusion in recent years are also included and discussed. Finally, some important and challenging open problems are presented in this book chapter.


Author(s) Details:

Lixin Wang,
TSYS School of Computer Science, Columbus State University, Columbus, GA 31907, USA.

Jianhua Yang,
TSYS School of Computer Science, Columbus State University, Columbus, GA 31907, USA.

Please see the link here: https://stm.bookpi.org/CPSTR-V7/article/view/13747

No comments:

Post a Comment