{"title":"An intruder tracing system based on a shadowing mechanism","authors":"Heejin Jang, Sangwook Kim","doi":"10.1109/ISCC.2002.1021780","DOIUrl":null,"url":null,"abstract":"Since current Internet intruders conceal their real identity by distributed or disguised attacks, it is not easy to deal with intruders properly only with an ex post facto chase. Therefore, we need to trace the intruder in real time. Existing real-time intruder tracing systems have a spatial restriction. It is impossible to respond to an attack which is done out of the security domain. This paper proposes the shadowing mechanism, a new approach to real-time intruder tracing, minimizing the spatial limitation of the traceable domain. The real-time tracing supports prompt response to the intrusion, detection of target host and laundering hosts. It also enhances the possibility of intruder identification.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC.2002.1021780","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Since current Internet intruders conceal their real identity by distributed or disguised attacks, it is not easy to deal with intruders properly only with an ex post facto chase. Therefore, we need to trace the intruder in real time. Existing real-time intruder tracing systems have a spatial restriction. It is impossible to respond to an attack which is done out of the security domain. This paper proposes the shadowing mechanism, a new approach to real-time intruder tracing, minimizing the spatial limitation of the traceable domain. The real-time tracing supports prompt response to the intrusion, detection of target host and laundering hosts. It also enhances the possibility of intruder identification.