Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk (Department of Network Security Research, ETRI) ;
  • Han, Seung-Wan (Department of Network Security Research, ETRI) ;
  • Seo, Dong-Il (Department of Network Security Research, ETRI) ;
  • Lee, Sang-Ho (Department of Computer Science, ChungBuk National Uni)
  • 발행 : 2003.10.22

초록

Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

키워드