z-logo
open-access-imgOpen Access
Detecting stepping‐stone intrusion using association rule mining
Author(s) -
Hsiao HanWei,
Sun HueyMin,
Fan WeiCheng
Publication year - 2013
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.692
Subject(s) - computer science , recall rate , association rule learning , intrusion detection system , hacker , data mining , the internet , filter (signal processing) , stepping stone , intrusion , test (biology) , interval (graph theory) , association (psychology) , protocol (science) , computer security , artificial intelligence , world wide web , computer vision , geology , philosophy , alternative medicine , mathematics , pathology , paleontology , epistemology , medicine , geochemistry , combinatorics , economic growth , unemployment , economics
Hackers generally do not use their own computers to launch attacks on the Internet to avoid exposing their actual locations. The trick involves an intruder connecting to a victim indirectly through a sequence of hosts called stepping‐stone, which makes network managers difficult to detect the intrusion, often results in serious injuries. In this study, a detection method of stepping‐stone based on the association rule mining of network traffic records is proposed. The association rules establish a model for detecting stepping‐stones in accordance with collecting the connecting records in the governed network. Test records are gathered from the source and destination addresses of Internet protocol in a fixed time interval, which are then analyzed with the association rules algorithm to filter out the transmission characteristics of stepping‐stone attacks. In the experimental results, empirical evaluation under 5 min of test records shows that the accuracy rate, the precision rate, and the recall rate are 83.81%, 84.26%, and 83.16%, respectively. When the test record gathering time is extended to 20 min, with the same detecting method, the three evaluations achieve 99.9%. The proposed detection method may be helpful to network management for detecting suspected stepping‐stone attacks. Copyright © 2013 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom