Abstract
While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in a computer and substitutes it with dummy data, which is then sent to the outside. Moreover, a program embedded in the dummy data transmits information back from the attacker's computer to a pre-specified system for investigation. Information about the attacker can be obtained by an attacker executing the program.
Original language | English |
---|---|
Title of host publication | Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 24-27 |
Number of pages | 4 |
ISBN (Print) | 9781479999583 |
DOIs | |
Publication status | Published - Jan 6 2016 |
Event | 4th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2015 - Okayama, Japan Duration: Jul 12 2015 → Jul 16 2015 |
Other
Other | 4th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2015 |
---|---|
Country/Territory | Japan |
City | Okayama |
Period | 7/12/15 → 7/16/15 |
Keywords
- Attacker investigation
- Information leakage
- Operating system
ASJC Scopus subject areas
- Information Systems
- Computer Networks and Communications
- Computer Science Applications
- Computer Vision and Pattern Recognition