TY - GEN
T1 - A survey of connection-chains detection techniques
AU - Almulhem, Ahmad
AU - Traore, Issa
PY - 2007
Y1 - 2007
N2 - A connection-chain is a set of connections created by sequentially logging into a series of hosts, known as stepping-stones. It provides an effective scheme for attackers to manually interact with a victim machine without disclosing their true origin. The victim will only identify the last host in the chain, while the true origin is hidden behind a series of stepping-stones. Addressing connection-chains poses challenges for researchers in the field of computer security. Accordingly, several approaches have been proposed in the literature. In this paper, we review those approaches and classify them according to a proposed taxonomy.
AB - A connection-chain is a set of connections created by sequentially logging into a series of hosts, known as stepping-stones. It provides an effective scheme for attackers to manually interact with a victim machine without disclosing their true origin. The victim will only identify the last host in the chain, while the true origin is hidden behind a series of stepping-stones. Addressing connection-chains poses challenges for researchers in the field of computer security. Accordingly, several approaches have been proposed in the literature. In this paper, we review those approaches and classify them according to a proposed taxonomy.
UR - http://www.scopus.com/inward/record.url?scp=47349128172&partnerID=8YFLogxK
U2 - 10.1109/PACRIM.2007.4313215
DO - 10.1109/PACRIM.2007.4313215
M3 - Conference contribution
AN - SCOPUS:47349128172
SN - 1424411904
SN - 9781424411900
T3 - IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings
SP - 219
EP - 222
BT - 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Conference Proceedings, PACRIM
ER -