Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
IEEE/ACM Transactions on Networking (TON)
What's up CAPTCHA?: a CAPTCHA based on image orientation
Proceedings of the 18th international conference on World wide web
IEEE Communications Magazine
Hi-index | 0.01 |
In recent years the use of internet has become wider and include many financial transactions and business information too. And these usages have led to the increasing of abuse from the internet. Although a lot of security software and hardware are designed to prevent cyber attacks, the efficiency of these tools hasn't been fully reliable. As a result, the study around the topic of identifying cyber criminals becomes too important. But for achieving this goal it's needed to trace any internet packets and relate it's IP address to a real person. But there are a lot of limitations in the structure of the internet to trace any internet packets. Also because this structure, primarily established for information transfer in academic and scientific environments on the basis of mutual trust, no identity confirmation is applied for the parties in communication protocols of TCP/IP model. During the past 10 years, subtle techniques have been introduced for tracing IP packets; however, considering the lack of proper infrastructure, the process of applying them has not yet become administrative. In this paper IPT framework will be introduced as an effective and administrative method for traceback of IP packets and identification of cyber criminal specially for crimes lead to data theft.