Skip to main content

Detecting Long Connection Chains of Interactive Terminal Sessions

  • Conference paper
  • First Online:
Recent Advances in Intrusion Detection (RAID 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2516))

Included in the following conference series:

Abstract

To elude detection and capture, hackers chain many computers together to attack the victim computer from a distance. This report proposes a new strategy for detecting suspicious remote sessions, used as part of a long connection chain. Interactive terminal sessions behave differently on long chains than on direct connections. The time gap between a client request and the server delayed acknowledgment estimates the round-trip time to the nearest server. Under the same conditions, the time gap between a client request and the server reply echo provides information on how many hops downstream the final victim is located. By monitoring an outgoing connection for these two time gaps, echo-delay comparison can identify a suspicious session in isolation. Experiments confirm that echo-delay comparison applies to a range of situations and performs especially well in detecting outgoing connections with more than two hops downstream.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stefan Axelsson. “Intrusion Detection Systems: A Survey and Taxonomy.” Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.

    Google Scholar 

  2. Robert K. Cunningham, et al. “Detecting and Deploying Novel Computer Attacks with Macroscope.” Proceeding of the 2000 IEEE Workshop on Information Assurance and Security. US Military Academy, West Point, NY, 6–7 June, 2001.

    Google Scholar 

  3. Harold S. Javitz and Alfonso Valdes. “The NIDES Statistical Component: Description and Justification.” Technical report, Computer Science Laboratory, SRI International. Menlo Park, California, March 1993.

    Google Scholar 

  4. Richard P. Lippmann, et al. “Evaluating Intrusion Detection Systems: The 1998 ARPA Off-Line Intrusion Detection Evaluation.” Proceedings of DARPA Information Survivability Conference and Exposition. DISCEX’ 00, Jan 25-27, Hilton Head, SC, 2000. http://www.ll.mit.edu/IST/ideval/index.html

  5. Peter G. Neumann and Phillip A. Porras. “Experience with EMERALD to Date.” 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pages 73–80. Santa Clara, California, USA, April 1999.

    Google Scholar 

  6. Thomas H. Ptacek and Timothy H. Newsham. “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection.” Secure Networks, Inc., January 1998. http://www.aciri.org/vern/PtacekNewsham-Evasion-98.ps

  7. Martin Roesch. “Snort: Lightweight intrusion detection for networks.” 13th Systems Administration Conference (LISA’99), pages 229–238. USENIX Associations, 1999.

    Google Scholar 

  8. Stuart Staniford-Chen and L. Todd Heberlein. “Holding Intruders Accountable on the Internet.” Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 39–49. Oakland, CA, May 1995.

    Google Scholar 

  9. W. Richard Stevens. TCP/IP Illustrated Volume 1: The Protocols. Addison-Wesley: Reading, Massachusetts, 1994.

    Google Scholar 

  10. Yin Zhang and Vern Paxson. “Detecting stepping stones.” Proceedings of 9th USENIX Security Symposium. August 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yung, K.H. (2002). Detecting Long Connection Chains of Interactive Terminal Sessions. In: Wespi, A., Vigna, G., Deri, L. (eds) Recent Advances in Intrusion Detection. RAID 2002. Lecture Notes in Computer Science, vol 2516. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36084-0_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-36084-0_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00020-4

  • Online ISBN: 978-3-540-36084-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics