Skip to Main content Skip to Navigation
New interface
Book sections

Bouncing Techniques

Abstract : Police investigation methods and tools are very efficient today in tracking down a cyber-attack. As a consequence, skilled cyber-terrorists now use some particular techniques in order to hide their real electronic identity. They can even mislead the investigators by showing another identity. Unfortunately, these techniques increasingly become widespread. We present several of these techniques and show how they can either help or betray attackers. An important conclusion of this paper is that unfortunately nowadays anonymity is practically attainable. The solution can not only rely on technology. International collaboration and information sharing is a key to this problem.
Document type :
Book sections
Complete list of metadata
Contributor : Équipe gestionnaire des publications SI LIRIS Connect in order to contact the contributor
Submitted on : Tuesday, October 10, 2017 - 9:25:57 AM
Last modification on : Friday, September 30, 2022 - 11:34:15 AM



Stéphane Coulondre. Bouncing Techniques. Colarik Andrew M., Janczewski Lech. Cyber Warfare and Cyber Terrorism, IDEA Group Publishing, pp.392-396, 2007, ⟨10.4018/978-1-59140-991-5.ch045⟩. ⟨hal-01613736⟩



Record views