Finding a Connection Chain for Tracing Intruders

@inproceedings{Yoda2000FindingAC,
  title={Finding a Connection Chain for Tracing Intruders},
  author={Kunikazu Yoda and Hiroaki Etoh},
  booktitle={ESORICS},
  year={2000}
}
Intruders usually log in through a chain of multiple computer systems to hide their origins before breaking into their targets, which makes tracing difficult. In this paper we present a method to find the connection chain of an intruder for tracing back to the origin. We focus on telnet and rlogin as interactive applications intruders use to log in through… CONTINUE READING

5 Figures & Tables

Topics

Statistics

0102030'02'04'06'08'10'12'14'16'18
Citations per Year

176 Citations

Semantic Scholar estimates that this publication has 176 citations based on the available data.

See our FAQ for additional information.