International Journal of Engineering Research and Applications (IJERA)
Network security is complex and challenging problem in today's world. Despite of many Sophisticated techniques, attack on the network continues to increase. At present, in order to hide the identity of the attacker, attackers send their attack through a chain of compromised hosts that are used as \"Stepping stones\". In this paper, the authors present an approach to find the connection chain of an intruder for tracing back to the origin especially if the attack through the traffic is encrypted one. Their approach will based on analyzing correlations of encrypted connection between number of packets sent in outgoing connections and that of the incoming packets in the connection.