Bouncing Techniques

Abstract : Police investigation methods and tools are very efficient today in tracking down a cyber-attack. As a consequence, skilled cyber-terrorists now use some particular techniques in order to hide their real electronic identity. They can even mislead the investigators by showing another identity. Unfortunately, these techniques increasingly become widespread. We present several of these techniques and show how they can either help or betray attackers. An important conclusion of this paper is that unfortunately nowadays anonymity is practically attainable. The solution can not only rely on technology. International collaboration and information sharing is a key to this problem.
Type de document :
Chapitre d'ouvrage
Colarik Andrew M., Janczewski Lech. Cyber Warfare and Cyber Terrorism, IDEA Group Publishing, pp.392-396, 2007, 〈10.4018/978-1-59140-991-5.ch045〉
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-01613736
Contributeur : Équipe Gestionnaire Des Publications Si Liris <>
Soumis le : mardi 10 octobre 2017 - 09:25:57
Dernière modification le : vendredi 10 novembre 2017 - 01:20:25

Identifiants

Collections

Citation

Stéphane Coulondre. Bouncing Techniques. Colarik Andrew M., Janczewski Lech. Cyber Warfare and Cyber Terrorism, IDEA Group Publishing, pp.392-396, 2007, 〈10.4018/978-1-59140-991-5.ch045〉. 〈hal-01613736〉

Partager

Métriques

Consultations de la notice

27