2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities

Research Article

A testbed for evaluation and analysis of stepping stone attack attribution techniques

  • @INPROCEEDINGS{10.1109/TRIDNT.2006.1649171,
        author={Jianqiang  Xin and Linfeng  Zhang and Brad  Aswegan and John  Dickerson and Julie  Dickerson and Thomas  Daniels and Yong  Guan},
        title={A testbed for evaluation and analysis of stepping stone attack attribution techniques},
        proceedings={2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities},
        publisher={IEEE},
        proceedings_a={TRIDENTCOM},
        year={2006},
        month={7},
        keywords={},
        doi={10.1109/TRIDNT.2006.1649171}
    }
    
  • Jianqiang Xin
    Linfeng Zhang
    Brad Aswegan
    John Dickerson
    Julie Dickerson
    Thomas Daniels
    Yong Guan
    Year: 2006
    A testbed for evaluation and analysis of stepping stone attack attribution techniques
    TRIDENTCOM
    IEEE
    DOI: 10.1109/TRIDNT.2006.1649171
Jianqiang Xin1,*, Linfeng Zhang1,*, Brad Aswegan1,*, John Dickerson1,*, Julie Dickerson1,*, Thomas Daniels1,*, Yong Guan1,*
  • 1: Department of Electrical and Computer Engineering, Iowa State University, Ames, Iowa 50011
*Contact email: jqxin@iastate.edu, zhanglf@iastate.edu, baswegan@iastate.edu, jedicker@iastate.edu, julied@iastate.edu, daniels@iastate.edu, yguan@iastate.edu

Abstract

This paper describes a testbed for experimentally evaluating stepping stone attack attribution techniques. There is a lack of comprehensive experimental evaluation of many different stepping stone attack detection schemes. Therefore, there are no objective, comparable evaluation results on the effectiveness and limitations of these schemes. In this research, we designed and built a scalable testbed environment that can evaluate all existing stepping stone attack attribution schemes reproducibly, provide a stable platform for further research on this area and be easily reconfigured, expanded, and operated with user-friendly interface. This testbed environment has been established in a dedicated stepping stone attack attribution research laboratory. An evaluation of proposed stepping stone techniques is currently underway.