作者: Heejin Jang , Sangwook Kim
关键词:
摘要: Since current internet intruders conceal their real identity by distributed or disguised attacks, it is not easy to deal with properly only an ex post facto chase. Therefore, needs trace the intruder in time. Existing real-time tracing systems has a spatial restriction. The security domain remains unchanged if there no system officer's intervention after installing system. It impossible respond attack which done out of domain. This paper proposes self-replication mechanism, new approach tracing, minimizing limitation traceable supports prompt response intrusion, detection target host and laundering hosts. also enhances possibility identification. Collected data during can be used generate hacking scenario database as legal evidence.