Correlating Temporal Thumbprints for Tracing Intruders

The Design of TCP/IP protocol makes it difficult to reliably traceback to the original attackers if they obscure their identities by logging through a chain of multiple hosts. A thumbprint method based on connection content was proposed in 1995 to traceback attackers, but this method is limited to n...

Full description

Bibliographic Details
Main Authors: Jianhua Yang, Shou-Hsuan Stephen Huang
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2006-08-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/P128657.pdf