Skip to main content

The Attack Back Mechanism: An Efficient Back-Hacking Technique

  • Conference paper

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 28))

Abstract

In recent years there has been substantial increase in both online conducted industrial espionage and hacking, resulting in heavy losses to various organizations across the globe. According to the U.S. officials’ estimations American companies in 2009 lost $50 billion alone due to cyber- espionage. The global losses due to internet hacking is estimated to be more than $1 trillion. Several techniques and methods are being used to protect data and network but all these techniques have been proved inefficient by the black hats. Then some organizations realized the need for counter attacking the attackers, but there approach doesn’t differentiate an innocent user from an attacker. These techniques mainly focus on tracing or counter attacking the suspected attacker on the basis of the IP address retrieved. But the actual attacker may spoof his IP address and therefore some other person may be affected by the counter attack. Moreover tracing an attacker on the basis of the spoofed IP is also a very difficult task. We have proposed a new technique for a counter attack which will efficiently differentiate between an attacker and a normal user. We mainly focus on entering the users system and verify his authenticity and ultimately making the task of tracing very simple.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jayaswal, V., Yurcik, W., Doss, D.: Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism? In: International Symposium on Technology and Society, pp. 380–386 (2002)

    Google Scholar 

  2. Juels, A., Kaliski Jr., B.S.: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)

    Google Scholar 

  3. Robinson Jr., C.: Make My Day Server Throws Gauntlet to Network Hackers. Signal Magazine (1998)

    Google Scholar 

  4. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lo, W.: Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Transactions on Computers 62(2), 362–375 (2013)

    Article  Google Scholar 

  5. Merkle, R.C.: Protocols for Public Key Cryptosystems. In: Proceedings of IEEE Symposium on Security and Privacy (1980)

    Google Scholar 

  6. Provos, N.: A virtual honeypot framework. CITI Technical Report 03-1 (2003)

    Google Scholar 

  7. Sailer, R., Jaeger, T., Zhang, X., Doorn, L.V.: Attestation-based Policy Enforcement for Remote Access

    Google Scholar 

  8. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote Data Checking Using Provable Data Possession. ACM Transactions on Information and System Security 14(1) (2011)

    Google Scholar 

  9. Castaneda, F., Sezer, F.C., Xu, J.: WORM vs. WORM: Preliminary Study of an Active Counter Attack Mechanism

    Google Scholar 

  10. Staniford, S., Paxson, V., Weaver, N.: How to 0wn the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium (2002)

    Google Scholar 

  11. Bellovin, S.M.: Distributed Firewalls. Login (1999)

    Google Scholar 

  12. Ferraiolo, F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference (1992)

    Google Scholar 

  13. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  14. Ateniese, G., Kamara, S., Katz, J.: Proofs of Storage from Homomorphic Identification Protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-Replica Provable Data Possession. In: Proceedings of IEEE International Conference on Distributed Computing Systems, pp. 411–420 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Joshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Joshi, A., Goudar, R.H. (2014). The Attack Back Mechanism: An Efficient Back-Hacking Technique. In: Kumar Kundu, M., Mohapatra, D., Konar, A., Chakraborty, A. (eds) Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-07350-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07350-7_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07349-1

  • Online ISBN: 978-3-319-07350-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics