ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 Security Requirement for Cyber Attack Traceback
Cited 3 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
유종호, 나중찬
발행일
200809
출처
International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.653-658
DOI
https://dx.doi.org/10.1109/NCM.2008.188
협약과제
08MS2300, AII-IP 환경의 지능형 사이버 공격 감시 및 추적 시스템 개발, 나중찬
초록
This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the guideline of the prerequisite factors as for networking and other generals when taken into account tracking technologies for counter-cyber attacks to program developers including security companies. For these purposes, this paper also conceptualize the traceback scenarios under various networking domain environment allowable for cyber attacks, while describing the required factors as a whole for tracing the attacking origins as well as other general things viewed from program requesters. Finally, it renders systematic standards required for the ongoing and would-be development of traceback technologies, along with standards to secure and authenticate the evidences violating information securities. © 2008 IEEE.
KSP 제안 키워드
Cyber attacks, Security requirements, Tracking technology, attack traceback