Skip to main content

Stepping-Stone Intrusion Detection and its Integration into Cybersecurity Curriculum

  • Chapter
  • First Online:
Innovations in Cybersecurity Education

Abstract

This chapter introduces stepping-stone intrusion and its detection techniques and integrates eight stepping-stone intrusion detection techniques into cybersecurity curriculum. Eight hands-on labs are designed to enhance students’ learning experience on stepping-stone intrusion detection techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Y. Zhang, and V. Paxson, Detecting Stepping-Stones, in Proc. the 9th USENIX Security Symposium, Denver, CO, 2000, pp. 67–81

    Google Scholar 

  2. K. H. Yung, Detecting Long Connecting Chains of Interactive Terminal Sessions, in Proc. the International Symposium on Recent Advance in Intrusion Detection, Zurich, Switzerland, 2002, pp.1–16

    Google Scholar 

  3. S. Staniford-Chen, and L. T. Heberlein, Holding Intruders Accountable on the Internet, in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, 1995, pp. 39–49

    Google Scholar 

  4. K. Yoda, and H. Etoh, Finding Connection Chain for Tracing Intruders, in Proc. 6 th European Symposium on Research in Computer Security, Toulouse, France, Lecture Notes in Computer Science, vol. 1985, 2000, pp. 31–42

    Google Scholar 

  5. A. Blum, D. Song, and S. Venkataraman, Detection of Interactive Stepping-Stones: Algorithms and Confidence Bounds, in Proc. of International Symposium on Recent Advance in Intrusion Detection, Sophia Antipolis, France, 2004, pp. 20–35

    Google Scholar 

  6. D. L. Donoho Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay, in Proc. The 5 th International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, 2002, pp. 45–59

    Google Scholar 

  7. T. He, L. Tong, Detecting encrypted stepping-stone connections. IEEE Transaction on Signal Processing 55(5), 1612–1623 (2007)

    Article  Google Scholar 

  8. X. Wang, D.S. Reeves, S.F. Wu, and J. Yu, Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework, in Proc. The 16 th International Conference on Information security, USA, 2001, pp. 369–384

    Google Scholar 

  9. X. Wang and D.S. Reeves, Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Inter-packet Delays, in Proc. The 10 th ACM Conference on Computer and Communications Security, USA, 2003, pp. 20–29

    Google Scholar 

  10. X. Wang, The Loop Fallacy and Serialization in Tracing Intrusion Connections through Stepping Stones, in Proc. the 2004 ACM Symposium on Applied Computing, USA, 2004, pp. 404–411

    Google Scholar 

  11. J. Yang, S.-H. S. Huang, A Real-Time Algorithm to Detect Long Connection Chains of Interactive Terminal Sessions, in Proc. the 3 rd ACM International Conference on Information Security, China, 2004, pp. 198–203

    Google Scholar 

  12. J. Yang, S.S.-H. Huang, Mining TCP/IP packets to detect stepping-stone intrusion. Journal of Computers and Security, Elsevier Ltd 26, 479–484 (2007)

    Article  Google Scholar 

  13. J. Yang, and Y. Zhang, RTT-based Random Walk Approach to Detect Stepping-Stone Intrusion, in Proc. the 29 th IEEE International Conference on Advanced Information Networking and Applications, Gwangju, South Korea, 2015, pp.558–563

    Google Scholar 

  14. J. Yang, Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-based Random Walk, in Proc. the 30 th IEEE International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, 2016, pp. 784–789

    Google Scholar 

  15. Z. Trabelsi, W. Ibrahim, A hands-on approach for teaching denial of service attacks: A case study. Journal of Information Technology Education: Innovations in Practice 12, 299–319 (2013)

    Google Scholar 

  16. A. McGettrick, Toward Curricular Guidelines for Cybersecurity, Report of a Workshop on Cybersecurity Education and Training, (2013)

    Google Scholar 

  17. J. Yang, and S.-H.S. Huang, Matching TCP Packets and Its Application to the Detection of Long Connection Chains, in Proc. the19th IEEE International Conference on Advanced Information Networking and Applications, Taiwan, China, 2005, pp. 1005–1010

    Google Scholar 

  18. Internet World Stats, Internet users distribution in the world-mid-year (2019). www.internetworldstats.com/stats.htm. Accessed 4 Dec 2019

  19. Internet Society, Cyber incident & breach trends report (2018). https://www.internetsociety.org/wp-content/uploads/2019/07/OTA-Incident-Breach-Trends-Report_2019.pdf. Accessed 4 Dec 2019

  20. Cybersecurity Job openings, http://cyberseek.org/heatmap.htm. Accessed 7 Dec 2019

  21. Emerging Threats, 10 Cyber security facts and statistics for 2018, Norton by Symantec. www.us.norton.com/internetsecurity-emerging-threats.htm. Accessed 4 Dec 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianhua Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yang, J. (2020). Stepping-Stone Intrusion Detection and its Integration into Cybersecurity Curriculum. In: Daimi, K., Francia III, G. (eds) Innovations in Cybersecurity Education. Springer, Cham. https://doi.org/10.1007/978-3-030-50244-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-50244-7_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-50243-0

  • Online ISBN: 978-3-030-50244-7

  • eBook Packages: EducationEducation (R0)

Publish with us

Policies and ethics