Abstract | ||
---|---|---|
While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in a computer and substitutes it with dummy data, which is then sent to the outside. Moreover, a program embedded in the dummy data transmits information back from the attacker's computer to a pre-specified system for investigation. Information about the attacker can be obtained by an attacker executing the program. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/IIAI-AAI.2015.247 | IIAI-AAI |
Keywords | Field | DocType |
operating system | Countermeasure,Vulnerability (computing),Information leakage,Leakage (electronics),Computer security,Computer science,Computer network,Dummy data,Classified information | Conference |
ISBN | Citations | PageRank |
978-1-4799-9957-6 | 0 | 0.34 |
References | Authors | |
3 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
yuta ikegami | 1 | 0 | 0.34 |
Toshihiro Yamauchi | 2 | 17 | 9.39 |