Title :
A self-extension monitoring for security management
Author :
Jang, Heejin ; Kim, Sangwook
Author_Institution :
Dept. of Comput. Sci., Kyungpook Nat. Univ., Taegu, South Korea
Abstract :
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. However most existing security systems remain passive and do not provide an active form of security protection. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. This paper presents a self-extension monitoring, a new approach in monitoring intruders, securing evidence against hackers and identifying them. It also proposes an intruder identification system (IIS), which is designed and implemented based on the proposed technique. The self-extension monitoring approach minimizes temporal and spatial limitations, making it possible to collect enough information for disclosure of the intruder´s identity. A system security administrator can prevent any unwanted intrusion and re-attack the intruder by creating and maintaining information regarding the intruder´s identity through the self-extension monitoring
Keywords :
authorisation; computer crime; active security protection; hackers; information infrastructures; information security patterns; information warfare; intruder identification system; security management; self-extension monitoring; Computer hacking; Computer science; Computer security; Computerized monitoring; Information security; Intrusion detection; National security; Network servers; Protection; Shadow mapping;
Conference_Titel :
Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference
Conference_Location :
New Orleans, LA
Print_ISBN :
0-7695-0859-6
DOI :
10.1109/ACSAC.2000.898873