Design an Algorithm Matching TCP Connection Pairs for Intruder Traceback


The KIPS Transactions:PartC, Vol. 13, No. 1, pp. 11-18, Feb. 2006
10.3745/KIPSTC.2006.13.1.11,   PDF Download:

Abstract

In the field of network defense, a lot of researches are directed toward locating the source of network attacks. When an intruder launches attack not from their own computer but from intermediate hosts that they previously compromised, and these intermediate hosts are called stepping-stones. There are two kinds of traceback technologies : IP packet traceback and connection traceback. We focused on connection traceback in this paper. This paper classifies process structures of detoured attack type in stepping stone, designs an algorithm for traceback agent, and implements the traceback system based on the agent


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. W. Kang, S. J. Hong, D. H. Lee, "Design an Algorithm Matching TCP Connection Pairs for Intruder Traceback," The KIPS Transactions:PartC, vol. 13, no. 1, pp. 11-18, 2006. DOI: 10.3745/KIPSTC.2006.13.1.11.

[ACM Style]
Hyung Woo Kang, Soon Jwa Hong, and Dong Hoon Lee. 2006. Design an Algorithm Matching TCP Connection Pairs for Intruder Traceback. The KIPS Transactions:PartC, 13, 1, (2006), 11-18. DOI: 10.3745/KIPSTC.2006.13.1.11.