View Article |
Anomaly techniques in stepping stone detection (SSD): a review
Ali Yusny Daud1, Osman Ghazali2, Mohd Nizam Omar3.
Stepping Stone Detection (SSD) can be used to trace back the real attacker in stepping-stone connection. Anomaly techniques are capable of identifying between normal and abnormal traffic. The collaboration of SSD and anomaly techniques enhanced the capability of detection of steppingstone connection. Several SSD approaches and anomaly techniques have been proposed in the literature. In this paper, we review these approaches and techniques. Furthermore, we suggest a potential future of anomaly techniques in SSD.
Affiliation:
- Universiti Utara Malaysia, Malaysia
- Universiti Utara Malaysia, Malaysia
- Universiti Utara Malaysia, Malaysia
Download this article (This article has been downloaded 66 time(s))
|
|
Indexation |
Indexed by |
MyJurnal (2019) |
H-Index
|
0 |
Immediacy Index
|
0.000 |
Rank |
0 |
Indexed by |
Scopus (SCImago Journal Rankings 2016) |
Impact Factor
|
0 |
Rank |
Q4 (Computer Networks and Communications) Q4 (Electrical and Electronic Engineering) Q4 (Hardware and Architecture) |
Additional Information |
0.112 (SJR) |
|
|
|