首页> 外文期刊>Computers & Security >Mining TCP/IP packets to detect stepping-stone intrusion
【24h】

Mining TCP/IP packets to detect stepping-stone intrusion

机译:挖掘TCP / IP数据包以检测踏脚石入侵

获取原文
           

摘要

An effective approach of detecting stepping-stone intrusion is to estimate the number of hosts compromised through estimating the length of a connection chain. This can be done by studying the changes in TCP packet round-trip time. In this paper, we propose a new algorithm by using data mining method to find the round-trip time from the time-stamps of TCP send and echo packets. Previous algorithms produce either good packet matches on very few packets, or poor matches on many packets. This method gives us better round-trip time and more matched packets than other algorithms proposed in the past. It can estimate the length of a connection more accurate than other methods and has largely decreased false positive error and false negative error in detecting stepping-stone intrusion comparing with existing methods.
机译:一种检测踏脚石入侵的有效方法是通过估计连接链的长度来估计受到破坏的主机的数量。这可以通过研究TCP数据包往返时间的变化来完成。在本文中,我们提出了一种新的算法,即使用数据挖掘方法从TCP发送和回送数据包的时间戳中查找往返时间。先前的算法要么在很少的数据包上产生好的数据包匹配,要么在许多数据包上产生差的匹配。与过去提出的其他算法相比,该方法为我们提供了更好的往返时间和更多的匹配数据包。与现有方法相比,它可以比其他方法更准确地估计连接的长度,并且在检测踏脚石入侵方面大大降低了误报率和误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号