Security

Evading Stepping-Stone Detection Under the Cloak of Streaming Media With SNEAK

Free registration required

Executive Summary

Network-based intrusions have become a serious threat to the users of the Internet. To help cover their tracks, attackers launch attacks from a series of previously compromised systems called stepping stones. Timing correlations on incoming and outgoing packets can lead to detection of the stepping stone and can be used to trace the attacker through each link. Prior work has sought to counter the possibility of the attacker employing chaff packets and randomized delays. To date, however, researchers have not accounted for the full range of techniques that a sophisticated attacker could apply. In this paper, the authors show that such an attacker could avoid detection by the best known stepping-stone detection methods.

  • Format: PDF
  • Size: 1392.64 KB