DocumentCode
2825005
Title
Security Requirement for Cyber Attack Traceback
Author
Ryu, JongHo ; Na, Jungchan
Author_Institution
Inf. Security Res. Div., Electron. & Telecommun. Res. Inst., Daejeon
Volume
2
fYear
2008
fDate
2-4 Sept. 2008
Firstpage
653
Lastpage
658
Abstract
This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the guideline of the prerequisite factors as for networking and other generals when taken into account tracking technologies for counter-cyber attacks to program developers including security companies. For these purposes, this paper also conceptualize the traceback scenarios under various networking domain environment allowable for cyber attacks, while describing the required factors as a whole for tracing the attacking origins as well as other general things viewed from program requesters. Finally, it renders systematic standards required for the ongoing and would-be development of traceback technologies, along with standards to secure and authenticate the evidences violating information securities.
Keywords
distributed processing; security of data; tracking; account tracking technology; attacking programs; counter-cyber attacks; cyber attack traceback; hacking; information security; networking domain environment; security requirement; traceback technology; viruses; Communication system security; Computer crime; Computer hacking; Computer networks; Computer security; Data security; Information management; Information security; Standards development; Telecommunication computing; Requirement; Traceback;
fLanguage
English
Publisher
ieee
Conference_Titel
Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on
Conference_Location
Gyeongju
Print_ISBN
978-0-7695-3322-3
Type
conf
DOI
10.1109/NCM.2008.188
Filename
4624222
Link To Document