DocumentCode
760335
Title
Challenges to automated attack traceback
Author
Lee, Susan C. ; Shields, Clay
Volume
4
Issue
3
fYear
2002
Firstpage
12
Lastpage
18
Abstract
Ideally, a traceback system would identify the human responsible for the attack. In this discussion, however, we limit traceback to determining the computer host that is the source of an attack. Once a traceback system identifies an attacker host, investigators can apply traditional methods of crime investigation or intelligence gathering to assign responsibility to an individual. To analyze the traceback problem, we must understand how attackers hide their identity. Most often, they compromise the two components of identity on the Internet
Keywords
Internet; computer crime; Internet; automated attack traceback; computer host; identity hiding; Authentication; Computer networks; Forensics; Humans; IP networks; Internet; Law; Legal factors; Protocols; TCPIP;
fLanguage
English
Journal_Title
IT Professional
Publisher
ieee
ISSN
1520-9202
Type
jour
DOI
10.1109/MITP.2002.1008532
Filename
1008532
Link To Document