In recent years there has been substantial increase in both online conducted industrial espionage and hacking, resulting in heavy losses to various organizations across the globe. According to the U.S. officials' estimations American companies in 2009 lost $50 billion alone due to cyber- espionage. The global losses due to internet hacking is estimated to be more than $1 trillion. Several techniques and methods are being used to protect data and network but all these techniques have been proved inefficient by the black hats. Then some organizations realized the need for counter attacking the attackers, but there approach doesn't differentiate an innocent user from an attacker. These techniques mainly focus on tracing or counter attacking the suspected attacker on the basis of the IP address retrieved. But the actual attacker may spoof his IP address and therefore some other person may be affected by the counter attack. Moreover tracing an attacker on the basis of the spoofed IP is also a very difficult task. We have proposed a new technique for a counter attack which will efficiently differentiate between an attacker and a normal user. We mainly focus on entering the users system and verify his authenticity and ultimately making the task of tracing very simple. © Springer International Publishing Switzerland 2014.
CITATION STYLE
Chettri, S. Kr., & Borah, B. (2014). Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, 28(VOLUME 2), 233–240. https://doi.org/10.1007/978-3-319-07350-7
Mendeley helps you to discover research relevant for your work.