• DocumentCode
    760335
  • Title

    Challenges to automated attack traceback

  • Author

    Lee, Susan C. ; Shields, Clay

  • Volume
    4
  • Issue
    3
  • fYear
    2002
  • Firstpage
    12
  • Lastpage
    18
  • Abstract
    Ideally, a traceback system would identify the human responsible for the attack. In this discussion, however, we limit traceback to determining the computer host that is the source of an attack. Once a traceback system identifies an attacker host, investigators can apply traditional methods of crime investigation or intelligence gathering to assign responsibility to an individual. To analyze the traceback problem, we must understand how attackers hide their identity. Most often, they compromise the two components of identity on the Internet
  • Keywords
    Internet; computer crime; Internet; automated attack traceback; computer host; identity hiding; Authentication; Computer networks; Forensics; Humans; IP networks; Internet; Law; Legal factors; Protocols; TCPIP;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2002.1008532
  • Filename
    1008532