DocumentCode
2019610
Title
An intruder tracing system based on a shadowing mechanism
Author
Jang, H. ; Kim, S.
Author_Institution
Dept. of Comput. Sci., Kyungpook Nat. Univ., Taegu, South Korea
fYear
2002
fDate
2002
Firstpage
904
Lastpage
909
Abstract
Since current Internet intruders conceal their real identity by distributed or disguised attacks, it is not easy to deal with intruders properly only with an ex post facto chase. Therefore, we need to trace the intruder in real time. Existing real-time intruder tracing systems have a spatial restriction. It is impossible to respond to an attack which is done out of the security domain. This paper proposes the shadowing mechanism, a new approach to real-time intruder tracing, minimizing the spatial limitation of the traceable domain. The real-time tracing supports prompt response to the intrusion, detection of target host and laundering hosts. It also enhances the possibility of intruder identification.
Keywords
Internet; authorisation; computer network management; real-time systems; telecommunication security; Internet; intruder identification; intruder tracing system; laundering hosts; real-time systems; shadowing mechanism; target host detection; Computer networks; Computer science; Data security; Information security; Internet; Intrusion detection; Monitoring; Real time systems; Shadow mapping; Target tracking;
fLanguage
English
Publisher
ieee
Conference_Titel
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
ISSN
1530-1346
Print_ISBN
0-7695-1671-8
Type
conf
DOI
10.1109/ISCC.2002.1021780
Filename
1021780
Link To Document