Title :
Security Requirement for Cyber Attack Traceback
Author :
Ryu, JongHo ; Na, Jungchan
Author_Institution :
Inf. Security Res. Div., Electron. & Telecommun. Res. Inst., Daejeon
Abstract :
This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the guideline of the prerequisite factors as for networking and other generals when taken into account tracking technologies for counter-cyber attacks to program developers including security companies. For these purposes, this paper also conceptualize the traceback scenarios under various networking domain environment allowable for cyber attacks, while describing the required factors as a whole for tracing the attacking origins as well as other general things viewed from program requesters. Finally, it renders systematic standards required for the ongoing and would-be development of traceback technologies, along with standards to secure and authenticate the evidences violating information securities.
Keywords :
distributed processing; security of data; tracking; account tracking technology; attacking programs; counter-cyber attacks; cyber attack traceback; hacking; information security; networking domain environment; security requirement; traceback technology; viruses; Communication system security; Computer crime; Computer hacking; Computer networks; Computer security; Data security; Information management; Information security; Standards development; Telecommunication computing; Requirement; Traceback;
Conference_Titel :
Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on
Conference_Location :
Gyeongju
Print_ISBN :
978-0-7695-3322-3
DOI :
10.1109/NCM.2008.188