• Title/Summary/Keyword: Intruder Activity Monitoring

Search Result 1, Processing Time 0.008 seconds

A Study on the Design of Intruder Tracing System Using Intrusion Method (침입기법을 응용한 침입자 역추적 시스템 설계에 관한 연구)

  • 김효남
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.34-39
    • /
    • 2003
  • There have been several researches to trace intruders on the Internet. But, up to now, few of them has shown a satisfactory and practicable result of the study. Recently, a little bit more active methods such as 'counter-attacking' have been considered to be an alternative to solve the problem of hacking, and some people showed a tendency to accept the method as one possible way to protect their systems. And the new intruder-retracing method suggested in this study is an improved AIAA(Autonomous Intrusion Analysis Agent) model which has been achieved by attaching the counter-attacking method to the existing tracing system. In this paper, the automatic intruder-tracking system is proposed, which was achieved through the design of the following three modules, such as the intruder-retracing module, intruder-tracing module and AIAA dispatch module.

  • PDF