Advanced Computing, Networking and Informatics- Volume 2

  • Chettri S
  • Borah B
N/ACitations
Citations of this article
118Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years there has been substantial increase in both online conducted industrial espionage and hacking, resulting in heavy losses to various organizations across the globe. According to the U.S. officials' estimations American companies in 2009 lost $50 billion alone due to cyber- espionage. The global losses due to internet hacking is estimated to be more than $1 trillion. Several techniques and methods are being used to protect data and network but all these techniques have been proved inefficient by the black hats. Then some organizations realized the need for counter attacking the attackers, but there approach doesn't differentiate an innocent user from an attacker. These techniques mainly focus on tracing or counter attacking the suspected attacker on the basis of the IP address retrieved. But the actual attacker may spoof his IP address and therefore some other person may be affected by the counter attack. Moreover tracing an attacker on the basis of the spoofed IP is also a very difficult task. We have proposed a new technique for a counter attack which will efficiently differentiate between an attacker and a normal user. We mainly focus on entering the users system and verify his authenticity and ultimately making the task of tracing very simple. © Springer International Publishing Switzerland 2014.

Cite

CITATION STYLE

APA

Chettri, S. Kr., & Borah, B. (2014). Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, 28(VOLUME 2), 233–240. https://doi.org/10.1007/978-3-319-07350-7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free