Back to Search
Start Over
Watch Your Step! Detecting Stepping Stones in Programmable Networks
- Source :
- ICC
- Publication Year :
- 2019
- Publisher :
- IEEE, 2019.
-
Abstract
- Hackers hide behind compromised intermediate hosts and pose advanced persistent threats (APTs). The compromised hosts are used as stepping stones to launch real attacks, as is evident from an incident that shook the world in 2016 — Panama Papers Leak. The major attack would not go unnoticed if the compromised stepping stone, in this case an email server, could be identified in time. In this paper, we explore how today's programmable networks could be retrofitted with effective stepping stone detection mechanisms to correlate flows. We share initial results to prove that such a setup exists. Lastly, we analyze scalability issues associated with the setup and explore recent developments in network monitoring which have potential to address these issues.
- Subjects :
- Advanced persistent threat
Computer science
05 social sciences
050801 communication & media studies
Intrusion detection system
Network monitoring
Communications system
Computer security
computer.software_genre
0508 media and communications
Stepping stone
0502 economics and business
Scalability
050211 marketing
Software-defined networking
computer
Hacker
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
- Accession number :
- edsair.doi...........fefc02679d8beea16d671ca2bc5a41cc
- Full Text :
- https://doi.org/10.1109/icc.2019.8761731