Most Recent Advances in Stepping-stone Intrusion
Contemporary Perspective on Science, Technology and Research Vol. 7,
13 March 2024
,
Page 147-162
https://doi.org/10.9734/bpi/cpstr/v7/7278A
Abstract
Today network intrusions are usually launched by attackers through compromised hosts, called stepping-stones, in order to minimize the chance of being detected. This book chapter presents the most recent research advances in the area of stepping-stone intrusion detection. All the important and significant methods proposed in recent years for stepping-stone intrusion detection are discussed and summarized in this book chapter. The two key techniques used for stepping-stone intrusion detection in recent years are packet matching and packet crossover. Both the packet matching-based detection methods and the packet crossover-based detection algorithms are presented and discussed. In addition to these two categories, other important detection algorithms for stepping-stone intrusion in recent years are also included and discussed. Finally, some important and challenging open problems are presented in this book chapter.
- Stepping-stones
- intrusion detection
- packet matching
- packet crossover
- connection chain