CFP last date
20 January 2025
Reseach Article

Design Issues in Stepping Stone Detection

by Rajesh Kumar Goutam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 9
Year of Publication: 2017
Authors: Rajesh Kumar Goutam
10.5120/ijca2017914108

Rajesh Kumar Goutam . Design Issues in Stepping Stone Detection. International Journal of Computer Applications. 166, 9 ( May 2017), 1-4. DOI=10.5120/ijca2017914108

@article{ 10.5120/ijca2017914108,
author = { Rajesh Kumar Goutam },
title = { Design Issues in Stepping Stone Detection },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 9 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number9/27694-2017914108/ },
doi = { 10.5120/ijca2017914108 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:13:12.961676+05:30
%A Rajesh Kumar Goutam
%T Design Issues in Stepping Stone Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 9
%P 1-4
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the rapid changing inter-connected environment, cyber criminals are opting sophisticated tools to hide their identities and locations. Stepping stones are now popular among the miscreants and making the situations worse. The paper details the role of stepping stones in hiding the cyber criminals and highlights it as challenge to differentiate the stepping stones from legitimate computers in the network. The paper details the various issues in stepping stones detection and explains four parameters that are playing a crucial role to identify the stepping stones in this inter-connected digital infrastructure.

References
  1. David A. Wheeler, Gregory N. Larsen and Task Leader, “Techniques for Cyber Attack Attribution”, Institute for Defense Analyses, October 2003.
  2. Yin Zhang and Vern Paxson, “Detecting Stepping Stones”, in Proc. Of the 9th USENIX Security Symposium Denver, Colorado, USA, August 2000 pp.171-184.
  3. Giovanni Di Crescenzo, Abhrajit Ghosh, Abhinay Kampasi, Rajesh Talpade and Yin Zhang, “Detecting Anomalies in Active Insider Stepping Stone Attacks”, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, Vol. 2 number , 2011, pp 103-120.
  4. Rajesh Kumar Goutam, “The Problem of Attribution in Cyber Security”, International journal of Computer Application, Foundation of computer science, Vol. 131, No. 7, NY, USA, December 2015 pp.34-36.
  5. H.F Lipson, “Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues”, Carnegie Mellon Software Engineering Institute, Pittsburgh, November 2002
  6. Susan C. Lee and Clay Shields, “Technical, Legal, and Societal Challenges to Automated Attack Trace back”, IT Pro, June 2002.
  7. S. M. Bellovin, “Security problems in the TCP/IP protocol suite” ACM SIGCOMM Computer Communications Review, vol. 19, issue 02, April 1989.
  8. Steven J. Templeton, Karl E. Levitt, “Detecting Spoofed Packets”, available at http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf on 20/04/2017.
Index Terms

Computer Science
Information Sciences

Keywords

Stepping stones Cybercrime IP Forging