Skip to main content

Abstract

Today, the most common way to perform various attacks is to use stepping stone hosts in the attacking path. In stepping stone attacks, attacker creates a long chain of connections via intermediary previously compromised nodes, to execute attack. The only way to break this chain is to detect stepping stones and applying some security constraints on the traffic flowing through them, not to allow malicious traffic through them. In this paper, we present classification and state-of-the-art of existing schemes proposed for stepping stone detection in recent past. Moreover, we compare these techniques based on their merits and demerits, and discuss open issues and challenges that can be used for further research in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Srivastava, A., Gupta, B.B., Tyagi, A., Sharma, A., Mishra, A.: A recent survey on DDoS attacks and defense mechanisms. In: Book on Advances in Parallel Distributed Computing, pp. 570-580. Springer (2011)

    Google Scholar 

  2. He, T., et al.: Packet scheduling against stepping-stone attacks with chaff. In: the proceeding of 25th IEEE Military Communications Conference (MILCOM), pp. 1–7 (2006)

    Google Scholar 

  3. Zhang, Y., Paxson, V.: Detecting stepping-stones. In: Proceedings of the 9th USENIX Security Symposium, pp. 67–81. Denver, CO, Aug 2000

    Google Scholar 

  4. Hsiao, H., Fan, W.-C.: Detecting step stone with network traffic mining approach. In: the proceeding of 4th IEEE Conference on Innovative Computing, Information and Control (ICICIC), pp. 1176—1179 (2009)

    Google Scholar 

  5. He, T., Tong, L.: Signal processing perspective to stepping stone detection. In: proceeding of 40th IEEE Annual Conference on Information Sciences and Systems, (CISS), pp. 687–692 (2006)

    Google Scholar 

  6. Gupta, B.B., Joshi, R.C., Misra, M.: Defending against distributed denial of service attacks: issues and challenges. Inf. Secur. J. Global Perspect. 18(5), 224–247 (2009)

    Article  Google Scholar 

  7. Staniford-Chen, S., Heberlein, L.T.: Holding intruders accountable on the internet. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 39-49. Oakland, CA (1995)

    Google Scholar 

  8. He, T., Tong, L.: Detecting encrypted stepping-stone connections. IEEE Trans. signal process. 55(5), 1612–1623 (2007)

    Article  MathSciNet  Google Scholar 

  9. Yang, J., Huang, S.-H.S.: Mining TCP/IP packets to detect stepping stone intrusion. Comput. Secur. 26(7–8), 479–484 (2007)

    Google Scholar 

  10. yang, J., Woolbright, D.: Correlating TCP/IP packet context to detect stepping stone intrusion. Comput. Secur. 30(4), 538–546 (2011)

    Google Scholar 

  11. Wu, H., Stephen Huang, S.-H.: Stepping stone intrusion detection using neural networks approach. J. Expert Syst. Appl. 37(2), 431–1437, Mar 2010

    Google Scholar 

  12. Omar, M.N., et al.: A stepping stone perspective to detection of network threats. Int. J. Appl. Math. Inf. 7(3), 97–106 (2013)

    Google Scholar 

  13. Omar, M.N. et al.: Hybrid stepping stone detection method. In: the Proceeding of 1st IEEE Conference on Distributed Framework and Applications (DFmA—2008), pp. 134–138 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. B. Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Rahul Kumar, Gupta, B.B. (2016). Stepping Stone Detection Techniques: Classification and State-of-the-Art. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_59

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_59

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics