Unmasking of source identity, a step beyond in cyber forensic

RY Patil, SR Devane - Proceedings of the 10th international conference …, 2017 - dl.acm.org
Increasing number of digital crime raises the need of investigation where the most critical
step is to collect the evidences of attack and find the real origin of the attack. However the …

An IP traceback model for network forensics

ES Pilli, RC Joshi, R Niyogi - Digital Forensics and Cyber Crime: Second …, 2011 - Springer
Network forensics deals with capture, recording, analysis and investigation of network traffic
to traceback the attackers. Its ultimate goal is to provide sufficient evidence to allow the …

Network forensics

Y Guan - Managing information security, 2014 - Elsevier
Today's cyber criminal investigator faces a formidable challenge: tracing network-based
cyber criminals. The possibility of becoming a victim of cyber crime is the number-one fear of …

[PDF][PDF] A Hybrid Traceback based Network Forensic Technique to Identifying Origin of Cybercrime.

R Patil, YH Patil, R Kachhoria, S Kumbhare… - Journal of Engineering …, 2022 - academia.edu
Protecting the critical infrastructure is crucial task when the cybercrime and cyber-threats are
on the rise. The internet is vulnerable to packet tampering, as it does not have any …

Network forensics: towards a classification of traceback mechanisms

S Mitropoulos, D Patsos… - Workshop of the 1st …, 2005 - ieeexplore.ieee.org
The traceback problem is one of the hardest in information security and has always been the
utmost solution to holding attackers accountable for their actions. This paper presents a brief …

IP traceback solutions based on time to live covert channel

E Jones, O Le Moigne, JM Robert - Proceedings. 2004 12th …, 2004 - ieeexplore.ieee.org
Due to its stateless nature, the Internet protocol (IP) requires forwarding devices to only
know each packet's next hop to correctly route any IP datagram towards its final destination …

An evaluation of different IP traceback approaches

V Kuznetsov, H Sandström, A Simkin - International Conference on …, 2002 - Springer
The problem of identifying the sources of a denial of service attack is among the hardest in
the Internet security area, especially since attackers often use incorrect, or spoofed, source …

Backtracking tool root-tracker to identify true source of cyber crime

PR Yogesh - Procedia Computer Science, 2020 - Elsevier
The main goal of the network forensic tools is to collect legal evidence of cybercrime from
the network environment by capturing, recording and analyzing the network packets. Such …

[PDF][PDF] Taxonomy of IP traceback

L Santhanam, A Kumar, DP Agrawal - Journal of Information Assurance …, 2006 - Citeseer
The internet is constantly plagued with various kinds of security threats amongst which
Denial of Service (DoS) constitutes a huge umbrella of potent attacks. It's very important to …

[PDF][PDF] Tracing the source of network attack: A technical, legal and societal problem

SC Lee, C Shields - … of the 2001 IEEE Workshop on …, 2001 - people.cs.georgetown.edu
In the field of network defense, very little research is directed toward locating the source of
network attacks. This paper models the technical aspects of attack traceback. By analyzing …