DocumentCode :
760335
Title :
Challenges to automated attack traceback
Author :
Lee, Susan C. ; Shields, Clay
Volume :
4
Issue :
3
fYear :
2002
Firstpage :
12
Lastpage :
18
Abstract :
Ideally, a traceback system would identify the human responsible for the attack. In this discussion, however, we limit traceback to determining the computer host that is the source of an attack. Once a traceback system identifies an attacker host, investigators can apply traditional methods of crime investigation or intelligence gathering to assign responsibility to an individual. To analyze the traceback problem, we must understand how attackers hide their identity. Most often, they compromise the two components of identity on the Internet
Keywords :
Internet; computer crime; Internet; automated attack traceback; computer host; identity hiding; Authentication; Computer networks; Forensics; Humans; IP networks; Internet; Law; Legal factors; Protocols; TCPIP;
fLanguage :
English
Journal_Title :
IT Professional
Publisher :
ieee
ISSN :
1520-9202
Type :
jour
DOI :
10.1109/MITP.2002.1008532
Filename :
1008532
Link To Document :
بازگشت