ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Security Requirement for Cyber Attack Traceback
Cited 3 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jong Ho Ryu, Jung Chan Na
Issue Date
2008-09
Citation
International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.653-658
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/NCM.2008.188
Abstract
This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the guideline of the prerequisite factors as for networking and other generals when taken into account tracking technologies for counter-cyber attacks to program developers including security companies. For these purposes, this paper also conceptualize the traceback scenarios under various networking domain environment allowable for cyber attacks, while describing the required factors as a whole for tracing the attacking origins as well as other general things viewed from program requesters. Finally, it renders systematic standards required for the ongoing and would-be development of traceback technologies, along with standards to secure and authenticate the evidences violating information securities. © 2008 IEEE.
KSP Keywords
Cyber attacks, Security requirements, Tracking technology, attack traceback