A taxonomy of internet traceback

Ihab Hamadeh, George Kesidis

Research output: Contribution to journalArticle

18 Citations (Scopus)

Abstract

Tracing back an anonymous hacker in the internet has been very hard to accomplish mainly due to the complexity of the internet and the lack of any deployed technology targeting this goal. In this paper, we introduce the most prominent research work done in the area of traceback. The traceback problem could be separated into IP traceback, traceback across stepping stones and worm traceback.

Original languageEnglish (US)
Pages (from-to)54-61
Number of pages8
JournalInternational Journal of Security and Networks
Volume1
Issue number1-2
StatePublished - Jan 1 2006

Fingerprint

Taxonomies
Internet

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

@article{150550f77f404ba9bc9e686b64ad10de,
title = "A taxonomy of internet traceback",
abstract = "Tracing back an anonymous hacker in the internet has been very hard to accomplish mainly due to the complexity of the internet and the lack of any deployed technology targeting this goal. In this paper, we introduce the most prominent research work done in the area of traceback. The traceback problem could be separated into IP traceback, traceback across stepping stones and worm traceback.",
author = "Ihab Hamadeh and George Kesidis",
year = "2006",
month = "1",
day = "1",
language = "English (US)",
volume = "1",
pages = "54--61",
journal = "International Journal of Security and Networks",
issn = "1747-8405",
publisher = "Inderscience Enterprises Ltd",
number = "1-2",

}

A taxonomy of internet traceback. / Hamadeh, Ihab; Kesidis, George.

In: International Journal of Security and Networks, Vol. 1, No. 1-2, 01.01.2006, p. 54-61.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A taxonomy of internet traceback

AU - Hamadeh, Ihab

AU - Kesidis, George

PY - 2006/1/1

Y1 - 2006/1/1

N2 - Tracing back an anonymous hacker in the internet has been very hard to accomplish mainly due to the complexity of the internet and the lack of any deployed technology targeting this goal. In this paper, we introduce the most prominent research work done in the area of traceback. The traceback problem could be separated into IP traceback, traceback across stepping stones and worm traceback.

AB - Tracing back an anonymous hacker in the internet has been very hard to accomplish mainly due to the complexity of the internet and the lack of any deployed technology targeting this goal. In this paper, we introduce the most prominent research work done in the area of traceback. The traceback problem could be separated into IP traceback, traceback across stepping stones and worm traceback.

UR - http://www.scopus.com/inward/record.url?scp=70449498446&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70449498446&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:70449498446

VL - 1

SP - 54

EP - 61

JO - International Journal of Security and Networks

JF - International Journal of Security and Networks

SN - 1747-8405

IS - 1-2

ER -