DocumentCode :
2825005
Title :
Security Requirement for Cyber Attack Traceback
Author :
Ryu, JongHo ; Na, Jungchan
Author_Institution :
Inf. Security Res. Div., Electron. & Telecommun. Res. Inst., Daejeon
Volume :
2
fYear :
2008
fDate :
2-4 Sept. 2008
Firstpage :
653
Lastpage :
658
Abstract :
This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the guideline of the prerequisite factors as for networking and other generals when taken into account tracking technologies for counter-cyber attacks to program developers including security companies. For these purposes, this paper also conceptualize the traceback scenarios under various networking domain environment allowable for cyber attacks, while describing the required factors as a whole for tracing the attacking origins as well as other general things viewed from program requesters. Finally, it renders systematic standards required for the ongoing and would-be development of traceback technologies, along with standards to secure and authenticate the evidences violating information securities.
Keywords :
distributed processing; security of data; tracking; account tracking technology; attacking programs; counter-cyber attacks; cyber attack traceback; hacking; information security; networking domain environment; security requirement; traceback technology; viruses; Communication system security; Computer crime; Computer hacking; Computer networks; Computer security; Data security; Information management; Information security; Standards development; Telecommunication computing; Requirement; Traceback;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on
Conference_Location :
Gyeongju
Print_ISBN :
978-0-7695-3322-3
Type :
conf
DOI :
10.1109/NCM.2008.188
Filename :
4624222
Link To Document :
بازگشت