Intruder tracing through dynamic extension of a security domain
Journal of Network and Computer Applications
Real-Time Intruder Tracing through Self-Replication
ISC '02 Proceedings of the 5th International Conference on Information Security
Network-based real-time connection traceback system (NRCTS) with packet marking technology
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Hi-index | 0.01 |
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. However most existing security systems remain passive and do not provide an active form of security protection. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. This paper presents a self-extension monitoring, a new approach in monitoring intruders, securing evidence against hackers and identifying them. It also proposes an intruder identification system (IIS), which is designed and implemented based on the proposed technique. The self-extension monitoring approach minimizes temporal and spatial limitations, making it possible to collect enough information for disclosure of the intruder's identity. A system security administrator can prevent any unwanted intrusion and re-attack the intruder by creating and maintaining information regarding the intruder's identity through the self-extension monitoring.