![]() The attackers exploit the stateless and trusting nature of the Internet and forge the source IP address of the attack packets to hide the identity of the attacker hence attackers could hinder the efforts to identify the real origin of attacks. With the recent proliferation of anonymous attack, it is becoming increasingly difficult for digital forensic specialists to analyse and identify the origin of an attack. Rodney Joffe, one of the world's sought-after cyber security experts has advised the White house and Federal agencies that attack attribution and law enforcement actions to identify the perpetrators are very important to protect the critical infrastructures of the nation. ![]() ![]() Unlike conventional warfare, figuring out who is behind an attack can be very difficult. One of the hardest issues in cyber counterintelligence is the problem of ‘Attribution’. Even recently, FBI voiced fear over terrorists gearing up for cyber warfare. In fact, US Department of Defence has recognised Cyberspace as the fifth domain in warfare, which has become just as critical to military operations as land, sea, air, and space. They attack vital systems, sometimes disrupting and disabling the work of hospitals, banks, and even emergency services in the country. McAfee report states that billions of dollars are lost every year due to cybercrime. The obtained result has been validated to demonstrate its statistical significance.Ĭybercrime has grown almost in direct proportion to the growth in dependence on information systems. It identifies the attack node with high accuracy and minimal false positive. It has the better endurance to the change in topology compared with the state-of-the-art schemes. Storage requirement is several thousand times lesser than the pioneer single packet traceback scheme and 6.25 times lesser than the state-of-the-art traceback scheme. According to CAIDA topology dataset, it requires only 320 kB of storage on each router. Compared to the state-of-the-art single packet IP traceback technique, the proposed scheme entails lesser computation overhead. The objective of this study is to propose an IP traceback scheme that can identify the origin of an attack with a single packet with minimum computational and storage overhead while ensuring a high degree of accuracy. The best antidote would be to weed out the problem at its root by identifying the source of the attack. Consequently, investigating cybercrime is becoming extremely difficult. Attackers exploit such vulnerabilities to forge the source IP addresses while instigating an attack. The internet has no protection against malicious packet modifications. IET Generation, Transmission & DistributionĪlthough cybercrime and cyber threats are increasing significantly, yet prevention and security of the critical infrastructure are still far from perfect.IET Electrical Systems in Transportation.IET Cyber-Physical Systems: Theory & Applications.IET Collaborative Intelligent Manufacturing.CAAI Transactions on Intelligence Technology.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |