Vol. 41,  No. 12, pp. 1771-1779, Dec.  2016


PDF
  Abstract

In these days, the world is getting connected to the internet like a sophisticated net, such an environment gives a suitable environment for cyber attackers, so-called cyber-terrorists. As a result, a number of cyber attacks has significantly increased and researches to find cyber attack traffics in the field of network monitoring has also been proceeding. But cyber attack traffics have been appearing in new forms in every attack making it harder to monitor. This paper suggests a method of tracking down cyber attack traffic sources by defining relational information flow of traffic data from highest cascaded and grouped relational flow. The result of applying this cyber attack source tracking method to real cyber attack traffic, was found to be reliable with quality results.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Goo, S. Choi, S. Lee, S. Kim, M. Kim, "," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 12, pp. 1771-1779, 2016. DOI: .

[ACM Style]

Young-Hoon Goo, Sun-Oh Choi, Su-Kang Lee, Sung-Min Kim, and Myung-Sup Kim. 2016. . The Journal of Korean Institute of Communications and Information Sciences, 41, 12, (2016), 1771-1779. DOI: .

[KICS Style]

Young-Hoon Goo, Sun-Oh Choi, Su-Kang Lee, Sung-Min Kim, Myung-Sup Kim, "," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 12, pp. 1771-1779, 12. 2016.