Backdoor attack detection based on stepping stone detection approach

Network intruders usually use a series of hosts (stepping stones) to conceal the tracks of their intrusion in the network. This type of intrusion can be detected through an approach called Stepping Stone Detection (SSD). In the past years, SSD was confined to the detection of only this type of intru...

Full description

Saved in:
Bibliographic Details
Main Author: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Format: Thesis
Language:en
en
Published: 2014
Subjects:
Online Access:https://etd.uum.edu.my/5616/1/s809887_01.pdf
https://etd.uum.edu.my/5616/2/s809887_02.pdf
https://etd.uum.edu.my/5616/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833436547804823552
author Al-Minshid, Khalid Abdulrazzaq Abdulnabi
author_facet Al-Minshid, Khalid Abdulrazzaq Abdulnabi
author_sort Al-Minshid, Khalid Abdulrazzaq Abdulnabi
building UUM Library
collection Institutional Repository
content_provider Universiti Utara Malaysia
content_source UUM Electronic Theses
continent Asia
country Malaysia
description Network intruders usually use a series of hosts (stepping stones) to conceal the tracks of their intrusion in the network. This type of intrusion can be detected through an approach called Stepping Stone Detection (SSD). In the past years, SSD was confined to the detection of only this type of intrusion. In this dissertation, we consider the use of SSD concepts in the field of backdoor attack detection. The application of SSD in this field results in many advantages. First, the use of SSD makes the backdoor attack detection and the scan process time faster. Second, this technique detects all types of backdoor attack, both known and unknown, even if the backdoor attack is encrypted. Third, this technique reduces the large storage resources used by traditional antivirus tools in detecting backdoor attacks. This study contributes to the field by extending the application of SSD-based techniques, which are usually used in SSD-based environments only, into backdoor attack detection environments. Through an experiment, the accuracy of SSD-based backdoor attack detection is shown as very high.
format Thesis
id my.uum.etd-5616
institution Universiti Utara Malaysia
language en
en
publishDate 2014
record_format eprints
spelling my.uum.etd-56162022-04-09T23:29:05Z https://etd.uum.edu.my/5616/ Backdoor attack detection based on stepping stone detection approach Al-Minshid, Khalid Abdulrazzaq Abdulnabi T58.5-58.64 Information technology Network intruders usually use a series of hosts (stepping stones) to conceal the tracks of their intrusion in the network. This type of intrusion can be detected through an approach called Stepping Stone Detection (SSD). In the past years, SSD was confined to the detection of only this type of intrusion. In this dissertation, we consider the use of SSD concepts in the field of backdoor attack detection. The application of SSD in this field results in many advantages. First, the use of SSD makes the backdoor attack detection and the scan process time faster. Second, this technique detects all types of backdoor attack, both known and unknown, even if the backdoor attack is encrypted. Third, this technique reduces the large storage resources used by traditional antivirus tools in detecting backdoor attacks. This study contributes to the field by extending the application of SSD-based techniques, which are usually used in SSD-based environments only, into backdoor attack detection environments. Through an experiment, the accuracy of SSD-based backdoor attack detection is shown as very high. 2014 Thesis NonPeerReviewed text en https://etd.uum.edu.my/5616/1/s809887_01.pdf text en https://etd.uum.edu.my/5616/2/s809887_02.pdf Al-Minshid, Khalid Abdulrazzaq Abdulnabi (2014) Backdoor attack detection based on stepping stone detection approach. Masters thesis, Universiti Utara Malaysia.
spellingShingle T58.5-58.64 Information technology
Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Backdoor attack detection based on stepping stone detection approach
title Backdoor attack detection based on stepping stone detection approach
title_full Backdoor attack detection based on stepping stone detection approach
title_fullStr Backdoor attack detection based on stepping stone detection approach
title_full_unstemmed Backdoor attack detection based on stepping stone detection approach
title_short Backdoor attack detection based on stepping stone detection approach
title_sort backdoor attack detection based on stepping stone detection approach
topic T58.5-58.64 Information technology
url https://etd.uum.edu.my/5616/1/s809887_01.pdf
https://etd.uum.edu.my/5616/2/s809887_02.pdf
https://etd.uum.edu.my/5616/
url_provider http://etd.uum.edu.my/