Bouncing Techniques

Abstract : Police investigation methods and tools are very efficient today in tracking down a cyber-attack. As a consequence, skilled cyber-terrorists now use some particular techniques in order to hide their real electronic identity. They can even mislead the investigators by showing another identity. Unfortunately, these techniques increasingly become widespread. We present several of these techniques and show how they can either help or betray attackers. An important conclusion of this paper is that unfortunately nowadays anonymity is practically attainable. The solution can not only rely on technology. International collaboration and information sharing is a key to this problem.
Document type :
Book sections
Complete list of metadatas

https://hal.archives-ouvertes.fr/hal-01613736
Contributor : Équipe Gestionnaire Des Publications Si Liris <>
Submitted on : Tuesday, October 10, 2017 - 9:25:57 AM
Last modification on : Wednesday, November 20, 2019 - 3:04:43 AM

Identifiers

Citation

Stéphane Coulondre. Bouncing Techniques. Colarik Andrew M., Janczewski Lech. Cyber Warfare and Cyber Terrorism, IDEA Group Publishing, pp.392-396, 2007, ⟨10.4018/978-1-59140-991-5.ch045⟩. ⟨hal-01613736⟩

Share

Metrics

Record views

63