z-logo
open-access-imgOpen Access
Detecting stepping‐stone intrusion using association rule mining
Author(s) -
Hsiao HanWei,
Sun HueyMin,
Fan WeiCheng
Publication year - 2013
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.692
Subject(s) - computer science , recall rate , association rule learning , intrusion detection system , hacker , data mining , the internet , filter (signal processing) , stepping stone , intrusion , test (biology) , interval (graph theory) , association (psychology) , protocol (science) , computer security , artificial intelligence , world wide web , computer vision , geology , philosophy , alternative medicine , mathematics , pathology , paleontology , epistemology , medicine , geochemistry , combinatorics , economic growth , unemployment , economics
Hackers generally do not use their own computers to launch attacks on the Internet to avoid exposing their actual locations. The trick involves an intruder connecting to a victim indirectly through a sequence of hosts called stepping‐stone, which makes network managers difficult to detect the intrusion, often results in serious injuries. In this study, a detection method of stepping‐stone based on the association rule mining of network traffic records is proposed. The association rules establish a model for detecting stepping‐stones in accordance with collecting the connecting records in the governed network. Test records are gathered from the source and destination addresses of Internet protocol in a fixed time interval, which are then analyzed with the association rules algorithm to filter out the transmission characteristics of stepping‐stone attacks. In the experimental results, empirical evaluation under 5 min of test records shows that the accuracy rate, the precision rate, and the recall rate are 83.81%, 84.26%, and 83.16%, respectively. When the test record gathering time is extended to 20 min, with the same detecting method, the three evaluations achieve 99.9%. The proposed detection method may be helpful to network management for detecting suspected stepping‐stone attacks. Copyright © 2013 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here