Tracking illegal system access in a ubiquitous environment – proposal for ATS, a traceback system using STOP

  • Authors:
  • Gwanghoon Kim;Soyeon Hwang;Deokgyu Lee

  • Affiliations:
  • INFOSEC, Co.LTD., Seoul, Korea;INFOSEC, Co.LTD., Seoul, Korea;Divison of Information Technology Engineering, SoonChunHyang University, Asan-si, ChoongNam, Korea

  • Venue:
  • ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a ubiquitous environment, the boundaries of network topology can change irregularly. In this paper, an Agent-based Traceback System (ATS) is proposed to track attacks that utilize systems within an area of the network topology that has been marked for management purposes. Some of the information exchanged within the proposed system utilizes the previously verified STOP [1]. The additional information provided by utilizing the ATS proposed in this paper will greatly enhance the reliability of the traceback process. In addition, the proposed system is flexible enough to be applied to resource management systems as well.