Anomaly Techniques in Stepping Stone Detection (SSD): A Review

Authors

  • Ali Yusny Daud School of Computing, College of Arts and Sciences, Universiti Utara Malaysia
  • Osman Ghazali School of Computing, College of Arts and Sciences, Universiti Utara Malaysia
  • Mohd Nizam Omar School of Computing, College of Arts and Sciences, Universiti Utara Malaysia

Keywords:

Anomaly, Attack, Stepping-Stone Detection, Trace Back,

Abstract

Stepping Stone Detection (SSD) can be used to trace back the real attacker in stepping-stone connection. Anomaly techniques are capable of identifying between normal and abnormal traffic. The collaboration of SSD and anomaly techniques enhanced the capability of detection of steppingstone connection. Several SSD approaches and anomaly techniques have been proposed in the literature. In this paper, we review these approaches and techniques. Furthermore, we suggest a potential future of anomaly techniques in SSD.

Downloads

Published

2018-02-21

How to Cite

Daud, A. Y., Ghazali, O., & Omar, M. N. (2018). Anomaly Techniques in Stepping Stone Detection (SSD): A Review. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-10), 61–66. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3792

Most read articles by the same author(s)