Abstract
In recent years there has been substantial increase in both online conducted industrial espionage and hacking, resulting in heavy losses to various organizations across the globe. According to the U.S. officials’ estimations American companies in 2009 lost $50 billion alone due to cyber- espionage. The global losses due to internet hacking is estimated to be more than $1 trillion. Several techniques and methods are being used to protect data and network but all these techniques have been proved inefficient by the black hats. Then some organizations realized the need for counter attacking the attackers, but there approach doesn’t differentiate an innocent user from an attacker. These techniques mainly focus on tracing or counter attacking the suspected attacker on the basis of the IP address retrieved. But the actual attacker may spoof his IP address and therefore some other person may be affected by the counter attack. Moreover tracing an attacker on the basis of the spoofed IP is also a very difficult task. We have proposed a new technique for a counter attack which will efficiently differentiate between an attacker and a normal user. We mainly focus on entering the users system and verify his authenticity and ultimately making the task of tracing very simple.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jayaswal, V., Yurcik, W., Doss, D.: Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism? In: International Symposium on Technology and Society, pp. 380–386 (2002)
Juels, A., Kaliski Jr., B.S.: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)
Robinson Jr., C.: Make My Day Server Throws Gauntlet to Network Hackers. Signal Magazine (1998)
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lo, W.: Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Transactions on Computers 62(2), 362–375 (2013)
Merkle, R.C.: Protocols for Public Key Cryptosystems. In: Proceedings of IEEE Symposium on Security and Privacy (1980)
Provos, N.: A virtual honeypot framework. CITI Technical Report 03-1 (2003)
Sailer, R., Jaeger, T., Zhang, X., Doorn, L.V.: Attestation-based Policy Enforcement for Remote Access
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote Data Checking Using Provable Data Possession. ACM Transactions on Information and System Security 14(1) (2011)
Castaneda, F., Sezer, F.C., Xu, J.: WORM vs. WORM: Preliminary Study of an Active Counter Attack Mechanism
Staniford, S., Paxson, V., Weaver, N.: How to 0wn the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium (2002)
Bellovin, S.M.: Distributed Firewalls. Login (1999)
Ferraiolo, F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference (1992)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)
Ateniese, G., Kamara, S., Katz, J.: Proofs of Storage from Homomorphic Identification Protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009)
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-Replica Provable Data Possession. In: Proceedings of IEEE International Conference on Distributed Computing Systems, pp. 411–420 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Joshi, A., Goudar, R.H. (2014). The Attack Back Mechanism: An Efficient Back-Hacking Technique. In: Kumar Kundu, M., Mohapatra, D., Konar, A., Chakraborty, A. (eds) Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-07350-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-07350-7_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07349-1
Online ISBN: 978-3-319-07350-7
eBook Packages: EngineeringEngineering (R0)