Title :
An intruder tracing system based on a shadowing mechanism
Author :
Jang, H. ; Kim, S.
Author_Institution :
Dept. of Comput. Sci., Kyungpook Nat. Univ., Taegu, South Korea
Abstract :
Since current Internet intruders conceal their real identity by distributed or disguised attacks, it is not easy to deal with intruders properly only with an ex post facto chase. Therefore, we need to trace the intruder in real time. Existing real-time intruder tracing systems have a spatial restriction. It is impossible to respond to an attack which is done out of the security domain. This paper proposes the shadowing mechanism, a new approach to real-time intruder tracing, minimizing the spatial limitation of the traceable domain. The real-time tracing supports prompt response to the intrusion, detection of target host and laundering hosts. It also enhances the possibility of intruder identification.
Keywords :
Internet; authorisation; computer network management; real-time systems; telecommunication security; Internet; intruder identification; intruder tracing system; laundering hosts; real-time systems; shadowing mechanism; target host detection; Computer networks; Computer science; Data security; Information security; Internet; Intrusion detection; Monitoring; Real time systems; Shadow mapping; Target tracking;
Conference_Titel :
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
Print_ISBN :
0-7695-1671-8
DOI :
10.1109/ISCC.2002.1021780