A proposal for cyber-attack trace-back using packet marking and logging

Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

3 被引用数 (Scopus)

抄録

Cyber-attack incidents have become more and more frequent and serious. As a countermeasure against cyber-attacks, the technology of (IP address etc.) trace-back to the attackers is essential. Although many methods have been proposed for this purpose, the existing techniques suffer from the following problems. Only the specific attacks can be traced back. The tracing back is too time-consuming and correct traffic-path reconfiguration cannot be guaranteed. In this study, we propose a new method to discover attackers quickly and correctly. By using simulation data, its performance is demonstrated.

本文言語英語
ホスト出版物のタイトルProceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
編集者Fatos Xhafa, Leonard Barolli, Noriki Uchida
出版社Institute of Electrical and Electronics Engineers Inc.
ページ603-607
ページ数5
ISBN(電子版)9781509009848
DOI
出版ステータス出版済み - 12 21 2016
イベント10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 - Fukuoka, 日本
継続期間: 7 6 20167 8 2016

出版物シリーズ

名前Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016

その他

その他10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
国/地域日本
CityFukuoka
Period7/6/167/8/16

All Science Journal Classification (ASJC) codes

  • コンピュータ ネットワークおよび通信
  • コンピュータ サイエンスの応用

引用スタイル