The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] tracing intruders(1hit)

1-1hit
  • Public Information Server for Tracing Intruders in the Internet

    Midori ASAKA  Takefumi ONABUTA  Shigeki GOTO  

     
    PAPER-Internet Technologies

      Vol:
    E84-B No:12
      Page(s):
    3104-3112

    The number of computer break-ins from the outside of an organization has increased with the rapid growth of the Internet. Since many intruders from the outside of an organization employ stepping stones, it is difficult to trace back where the real origin of the attack is. Some research projects have proposed tracing methods for DoS attacks and detecting method of stepping stones. It is still difficult to locate the origin of an attack that uses stepping stones. We have developed IDA (Intrusion Detection Agent system), which has an intrusion tracing mechanism in a LAN environment. In this paper, we improve the tracing mechanism so that it can trace back stepping stones attack in the Internet. In our method, the information about tracing stepping stone is collected from hosts in a LAN effectively, and the information is made available at the public information server. A pursuer of stepping stone attack can trace back the intrusion based on the information available at the public information server on an intrusion route.