Sleepy watermark tracing: an active network-based intrusion response framework
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Finding a Connection Chain for Tracing Intruders
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
A self-extension monitoring for security management
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Holding intruders accountable on the Internet
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
Journal of Network and Systems Management
Hi-index | 0.00 |
Recently the number of Internet users has very sharply increased, and the number of intrusions has also increased very much. Consequently, security products are being developed and adapted to prevent systems and networks from being hacked and intruded. Even if security products are adapted, however, hackers can still attack a system and get a special authorization because the security products cannot prevent a system and network from every instance of hacking and intrusion. Therefore, the researchers have focused on an active hacking prevention method, and they have tried to develop a traceback system that can find the real location of an attacker. At present, however, because of the Internet's diversity real-time traceback is very difficult. To overcome this problem, a traceback system is proposed in this paper that have a possibility to be adapted to the current Internet environment. The system is a Network-based Real-Time Connection Traceback System (NRCTS) that uses the packet marking technique.