@inproceedings{469307f7e36b4d07af6864788f28dc82,
title = "Mining and detecting connection-chains in network traffic",
abstract = "A connection-chain refers to the set of connections created by sequentially logging into a series of hosts. Attackers typically use connection chains to indirectly carry their attacks and stay anonymous. In this paper, we proposed a host-based algorithm to detect connection chains by passively monitoring inbound and outbound packets. In particular, we employ concepts from association rule mining in the data mining literature. The proposed approach is first explained in details. We then present our evaluations of the approach in terms of real-time and detection performance. Our experimentations suggest that the algorithm is suitable for real-time operation, because the average processing time per packet is both constant and low. We also show that by appropriately setting underlying parameters we can achieve perfect detection.",
keywords = "Connection chain, Network security, Networkforensics, Stepping stone, Traceback, Tracing",
author = "Ahmad Almulhem and Issa Traore",
year = "2007",
doi = "10.1007/978-0-387-73655-6\_4",
language = "English",
isbn = "9780387736549",
series = "IFIP International Federation for Information Processing",
pages = "47--57",
editor = "Sandro Etalle and Stephen Marsh",
booktitle = "Trust Management",
}