Fighting Cybercrime with Packet Attestation

نویسندگان

  • Andreas Haeberlen
  • Pedro Fonseca
  • Rodrigo Rodrigues
  • Peter Druschel
چکیده

IP source addresses are often the only initial lead when investigating cybercrime in the Internet. Unfortunately, source addresses are easily forged, which can protect the culprits and lead to false accusations. We describe a new method for packet attestation in the Internet. Packet attestation establishes whether or not a given IP packet was sent by a particular network subscriber. This capability allows network operators to verify the source of malicious traffic and to validate complaints, identity requests, and DMCA take-down notices against their clients. As a result, innocent users cannot be falsely accused, while the culprits no longer enjoy plausible deniability. Support for packet attestation can be deployed incrementally by ISPs, and requires no changes to end hosts or to the network core. Disciplines Computer Sciences Comments Haeberlen, A., Fonseca, P., Rodrigues, R., & Druschel, P., Fighting Cybercrime with Packet Attestation, Technical Report MPI-SWS-2011-002 This technical report is available at ScholarlyCommons: http://repository.upenn.edu/cis_papers/616 Fighting Cybercrime with Packet Attestation Andreas Haeberlen Pedro Fonseca Rodrigo Rodrigues Peter Druschel University of Pennsylvania Max Planck Institute for Software Systems (MPI-SWS) Technical Report MPI-SWS-2011-002

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fighting cybercrime: a review and the Taiwan experience

Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries tha...

متن کامل

Approach To Solving Cybercrime And Cybersecurity

Cybercrime is becoming ever more serious. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international perspective on fighting Cybercrime. This work seeks to define the concept o...

متن کامل

Harmonization among national cyber security and cybercrime response organizations: New challenges of cybercrime

This presentation will discuss the need for national-level organizational strategies to effectively combat cyber security threats and cybercrime. In many countries, new agencies have been established and/or new roles have been allotted to existing agencies to cope with the needs for cyber security or fighting against cybercrime. The two pillars of organizational structure and functions (i.e., s...

متن کامل

Fighting computer crime - a new framework for protecting information

Description: Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to. Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpe...

متن کامل

Networks of Cybercrime Prevention: A Process Study of the Credit Card

This research-in-progress paper reports on a project that seeks to develop a new process perspective on incentive mechanisms in cybercrime prevention networks. Adopting such a view is of great importance given the continuous innovations in cybercrime that makes fighting it a constant endeavour, involving actors from multiple networks. To this end, we zoom in on specific prevention encounters oc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011