DocumentCode :
2019610
Title :
An intruder tracing system based on a shadowing mechanism
Author :
Jang, H. ; Kim, S.
Author_Institution :
Dept. of Comput. Sci., Kyungpook Nat. Univ., Taegu, South Korea
fYear :
2002
fDate :
2002
Firstpage :
904
Lastpage :
909
Abstract :
Since current Internet intruders conceal their real identity by distributed or disguised attacks, it is not easy to deal with intruders properly only with an ex post facto chase. Therefore, we need to trace the intruder in real time. Existing real-time intruder tracing systems have a spatial restriction. It is impossible to respond to an attack which is done out of the security domain. This paper proposes the shadowing mechanism, a new approach to real-time intruder tracing, minimizing the spatial limitation of the traceable domain. The real-time tracing supports prompt response to the intrusion, detection of target host and laundering hosts. It also enhances the possibility of intruder identification.
Keywords :
Internet; authorisation; computer network management; real-time systems; telecommunication security; Internet; intruder identification; intruder tracing system; laundering hosts; real-time systems; shadowing mechanism; target host detection; Computer networks; Computer science; Data security; Information security; Internet; Intrusion detection; Monitoring; Real time systems; Shadow mapping; Target tracking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
ISSN :
1530-1346
Print_ISBN :
0-7695-1671-8
Type :
conf
DOI :
10.1109/ISCC.2002.1021780
Filename :
1021780
Link To Document :
بازگشت