메뉴 건너뛰기




Volumn 25, Issue 5, 2006, Pages 351-370

On Incident Handling and Response: A state-of-the-art approach

Author keywords

Computer forensics; Incident Handling; Incident Response; Internet forensics; Software forensics; Trace back mechanisms

Indexed keywords

COMPUTER NETWORKS; COMPUTER SOFTWARE; DATA HANDLING; INFORMATION MANAGEMENT; NETWORK PROTOCOLS; SOCIAL ASPECTS;

EID: 33746748784     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.09.006     Document Type: Article
Times cited : (71)

References (52)
  • 2
    • 33746713807 scopus 로고    scopus 로고
    • CERT guide to system and network security practices
    • Allen J. CERT guide to system and network security practices. Addison-Wesley (2001)
    • (2001) Addison-Wesley
    • Allen, J.1
  • 3
    • 0036329754 scopus 로고    scopus 로고
    • Tracing network attacks to their sources
    • Baba T., and Matsuda S. Tracing network attacks to their sources. IEEE Internet Computing 6 3 (2002)
    • (2002) IEEE Internet Computing , vol.6 , Issue.3
    • Baba, T.1    Matsuda, S.2
  • 4
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • Bellovin S.M. Security problems in the TCP/IP protocol suite. Computer Communication Review 19 2 (April 1989) 32-48
    • (1989) Computer Communication Review , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 5
    • 33746738939 scopus 로고    scopus 로고
    • Bellovin SM. ICMP traceback messages, Internet draft (work in progress); February 2003.
  • 6
    • 4243105024 scopus 로고    scopus 로고
    • The discipline of Internet forensics
    • Berghel H. The discipline of Internet forensics. Communications of the ACM 46 8 (August 2003)
    • (2003) Communications of the ACM , vol.46 , Issue.8
    • Berghel, H.1
  • 7
    • 33746694898 scopus 로고    scopus 로고
    • BSI. Information security management, BS7799, part 1: code of practice for information security management; 1999.
  • 8
    • 33746716321 scopus 로고    scopus 로고
    • Available from: [3/01/2005]
    • CERT/CC. Security of the Internet [online]. Available from:. http://www.cert.org/encyc_article/tocencyc.html [3/01/2005]
    • Security of the Internet [online]
  • 9
    • 33746693817 scopus 로고    scopus 로고
    • Council of Europe. Convention on cyber crime. In: European treaty series - no. 185, Budapest; 2001.
  • 12
    • 33746696735 scopus 로고    scopus 로고
    • Harris Interactive. Identity theft new survey & trend report. Commissioned by Privacy & American Business; August 2003.
  • 13
    • 84969506813 scopus 로고    scopus 로고
    • Hiltz SR, Han HJ, Briller V. Public attitudes towards a national identity "Smart Card:" privacy and security concerns. In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS'03). Hilton Waikoloa Village, Island of Hawaii, January 6-9; 2003.
  • 18
    • 33746716944 scopus 로고    scopus 로고
    • Jung HT, Kim HL, Seo YM, Choe G, Min SL, Kim CS, et al. Caller identification system in the Internet environment. In: Proceedings of fourth USENIX security symposium; 1993.
  • 25
    • 84950242640 scopus 로고    scopus 로고
    • Mankin A, Massey D, Wu CL, Zhang L. On design and evaluation of intention-driven ICMP traceback. In: IEEE international conference on computer communications and networks (ICCCN); October 2001.
  • 30
    • 84949856103 scopus 로고    scopus 로고
    • Nong Y, Giordano J, Feldman J, Zhong Q. Information fusion techniques for network intrusion detection. In: IEEE information technology conference, information environment for the future, Syracuse, NY, USA; September 1998
  • 31
    • 33746776929 scopus 로고    scopus 로고
    • Available from: [05/01/2005]
    • OMB's Circular No. A-130. Appendix III online. Available from:. http://www.whitehouse.gov/omb/circulars/a130/a130trans4.html [05/01/2005]
    • Appendix III online
  • 32
    • 33746688648 scopus 로고    scopus 로고
    • Park K, Lee H. On the effectiveness of probabilistic packet marking for IP traceback. In: Proceedings of 2001 conference on applications, technologies, architectures and protocols for computer communication, ACM SIGCOMM'01. San Francisco, US; August 2001.
  • 33
    • 33746732358 scopus 로고    scopus 로고
    • Patsos D. A strategic approach to incident response, M.Sc. thesis. London: Department of Mathematics/Information Security Group, Royal Holloway University of London; 2002.
  • 36
    • 33746679930 scopus 로고    scopus 로고
    • Savage S, Wetherall D, Karlin A, Anderson T. Practical network support for IP traceback. In: Proceedings of SIGCOMM'00. Stockholm, Sweden; August 2000.
  • 37
    • 33746671388 scopus 로고    scopus 로고
    • Schnackenberg D, Djahandari K, Reid T, Wilson B. Cooperative intrusion traceback and response architecture (CITRA), Boeing Phantom Works and NAI Labs, prepared under contract N66001-01-C-8048 for Space and Naval Warfare System Center (SSC), San Diego; February 2002.
  • 38
    • 1542305470 scopus 로고    scopus 로고
    • Incident response teams need to change
    • Schultz E. Incident response teams need to change. Computers and Security Journal 23 (January 2004) 87-88
    • (2004) Computers and Security Journal , vol.23 , pp. 87-88
    • Schultz, E.1
  • 39
    • 33746716318 scopus 로고    scopus 로고
    • Solove DJ. The legal construction of identity theft. In: Symposium: digital cops in a virtual environment Yale law school; March 26-28, 2004.
  • 40
    • 0034997397 scopus 로고    scopus 로고
    • Song DX, Perrig A. Advanced and authenticated marking schemes for IP traceback. In: Proceeding of the IEEE INFOCOM01. Anchorage, Alaska; April 2001.
  • 41
    • 33746664342 scopus 로고    scopus 로고
    • Spafford EH, Weeber SA. Software forensics: can we track code to its authors? Purdue Technical Report CSD-TR 92-010; February 1992.
  • 42
    • 0029232080 scopus 로고    scopus 로고
    • Staniford-Chen S, Heberlein LT. Holding intruders accountable on the Internet. In: Proceedings of IEEE symposium on security and privacy; 1995.
  • 43
    • 33746755449 scopus 로고    scopus 로고
    • Stoll C. The cuckoo's egg, pocket; reprint edition; November 1, 1990.
  • 44
    • 85084163540 scopus 로고    scopus 로고
    • Stone R. CenterTrack: an IP overlay network for tracking DoS floods. In: Proceedings of 9th Usenix security symposium; August 2000.
  • 45
    • 33746725433 scopus 로고    scopus 로고
    • United States Code, Chapter 35 of Title 44, Subchapter III - Information Security, Federal Information Security Management Act (FISMA) of 2002.
  • 46
    • 33746740551 scopus 로고    scopus 로고
    • US Department of Commerce. Federal Information Processing Standards Publication 198, The Keyed-Hash Message Authentication Code (HMAC); March 6, 2002.
  • 48
    • 33746708244 scopus 로고    scopus 로고
    • Wang XY, Reeves DS, Wu SF, Yuill J. Sleepy watermark tracing: an active intrusion response framework. In: Proceedings of the 16th international information security conference (IFIP/Sec'01); June 2001.
  • 52
    • 85084161090 scopus 로고    scopus 로고
    • Zhang Y, Paxson V. Detecting stepping stones. In: Proceedings of the 9th USENIX security symposium. Denver, Colorado, August 14-17; 2000.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.