Backdoor attack detection based on stepping stone detection approach

Network intruders usually use a series of hosts (stepping stones) to conceal the tracks of their intrusion in the network. This type of intrusion can be detected through an approach called Stepping Stone Detection (SSD). In the past years, SSD was confined to the detection of only this type of intru...

Full description

Bibliographic Details
Main Author: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Format: Thesis
Language:English
English
Published: 2014
Subjects:
Online Access:https://etd.uum.edu.my/5616/1/s809887_01.pdf
https://etd.uum.edu.my/5616/2/s809887_02.pdf
https://etd.uum.edu.my/5616/
Abstract Abstract here
_version_ 1855353523634438144
author Al-Minshid, Khalid Abdulrazzaq Abdulnabi
author_facet Al-Minshid, Khalid Abdulrazzaq Abdulnabi
author_sort Al-Minshid, Khalid Abdulrazzaq Abdulnabi
description Network intruders usually use a series of hosts (stepping stones) to conceal the tracks of their intrusion in the network. This type of intrusion can be detected through an approach called Stepping Stone Detection (SSD). In the past years, SSD was confined to the detection of only this type of intrusion. In this dissertation, we consider the use of SSD concepts in the field of backdoor attack detection. The application of SSD in this field results in many advantages. First, the use of SSD makes the backdoor attack detection and the scan process time faster. Second, this technique detects all types of backdoor attack, both known and unknown, even if the backdoor attack is encrypted. Third, this technique reduces the large storage resources used by traditional antivirus tools in detecting backdoor attacks. This study contributes to the field by extending the application of SSD-based techniques, which are usually used in SSD-based environments only, into backdoor attack detection environments. Through an experiment, the accuracy of SSD-based backdoor attack detection is shown as very high.
format Thesis
id oai:etd.uum.edu.my:5616
institution Universiti Utara Malaysia
language English
English
publishDate 2014
record_format EPrints
record_pdf Abstract
spelling oai:etd.uum.edu.my:56162022-04-09T23:29:05Z https://etd.uum.edu.my/5616/ Backdoor attack detection based on stepping stone detection approach Al-Minshid, Khalid Abdulrazzaq Abdulnabi T58.5-58.64 Information technology Network intruders usually use a series of hosts (stepping stones) to conceal the tracks of their intrusion in the network. This type of intrusion can be detected through an approach called Stepping Stone Detection (SSD). In the past years, SSD was confined to the detection of only this type of intrusion. In this dissertation, we consider the use of SSD concepts in the field of backdoor attack detection. The application of SSD in this field results in many advantages. First, the use of SSD makes the backdoor attack detection and the scan process time faster. Second, this technique detects all types of backdoor attack, both known and unknown, even if the backdoor attack is encrypted. Third, this technique reduces the large storage resources used by traditional antivirus tools in detecting backdoor attacks. This study contributes to the field by extending the application of SSD-based techniques, which are usually used in SSD-based environments only, into backdoor attack detection environments. Through an experiment, the accuracy of SSD-based backdoor attack detection is shown as very high. 2014 Thesis NonPeerReviewed text en https://etd.uum.edu.my/5616/1/s809887_01.pdf text en https://etd.uum.edu.my/5616/2/s809887_02.pdf Al-Minshid, Khalid Abdulrazzaq Abdulnabi (2014) Backdoor attack detection based on stepping stone detection approach. Masters thesis, Universiti Utara Malaysia.
spellingShingle T58.5-58.64 Information technology
Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Backdoor attack detection based on stepping stone detection approach
thesis_level Master
title Backdoor attack detection based on stepping stone detection approach
title_full Backdoor attack detection based on stepping stone detection approach
title_fullStr Backdoor attack detection based on stepping stone detection approach
title_full_unstemmed Backdoor attack detection based on stepping stone detection approach
title_short Backdoor attack detection based on stepping stone detection approach
title_sort backdoor attack detection based on stepping stone detection approach
topic T58.5-58.64 Information technology
url https://etd.uum.edu.my/5616/1/s809887_01.pdf
https://etd.uum.edu.my/5616/2/s809887_02.pdf
https://etd.uum.edu.my/5616/
work_keys_str_mv AT alminshidkhalidabdulrazzaqabdulnabi backdoorattackdetectionbasedonsteppingstonedetectionapproach