A stepping stone perspective to detection of network threats

Current computing trends such as cloud computing, file sharing and social networking promote collaboration and allow greater mobility for users.Nevertheless, these computing trends increase the vulnerability of networks to security threats and challenge network resources.An ingenious technique em...

Full description

Saved in:
Bibliographic Details
Main Authors: Omar, Mohd Nizam, Amphawan, Angela, Din, Roshidi
Format: Article
Language:English
Published: North Atlantic University Union 2013
Subjects:
Online Access:http://repo.uum.edu.my/14208/1/Step.pdf
http://repo.uum.edu.my/14208/
http://naun.org/cms.action?id=5358
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Current computing trends such as cloud computing, file sharing and social networking promote collaboration and allow greater mobility for users.Nevertheless, these computing trends increase the vulnerability of networks to security threats and challenge network resources.An ingenious technique employed by attackers for retaining anonymity is by exploiting intermediary host computers or stepping stones to instigate attacks on other computers.This paper explores novel application of the stepping stone detection concept in addressing network threats such as spams, backdoors, proxy server intrusions and denial of service attacks.Preliminary stepping stone detection models for each security threat will be constructed and the potential detection process is delineated.These preliminary concepts and models may prove useful for further optimization of network security in conjunction with other conventional detection techniques.