Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 231-235.doi: 10.3969/j.issn.1671-1122.2015.09.051

• Orginal Article • Previous Articles     Next Articles

Research on Threat Traceback Method Based on IDS Alarms and Rootkit

Kun-peng XIA(), Zheng-yong XIE, Wei CUI   

  1. Yunnan Province Public Security Bureau Cyber Police Corps, Kunming Yunnan 650021, China
  • Received:2015-07-15 Online:2015-09-01 Published:2015-11-13

Abstract:

With the popularization and development of Internet application, Internet-based network threat has posed a serious challenge to everyone’s work and life. In order to deal with this challenge as well as create a safe and trusted Internet environment for the cyber citizens, this paper reads up the problem of threat information traceback, analyzes the drawbacks of the existing method of threat traceback, proposes a threat traceback scheme which is based on the alarms of intrusion detection system and rootkit technology. This paper sets up the assumption of the scheme according to the fact when traceback threat, analyzes the feasibility, proposes the challenge.

Key words: threat traceback, intrusion detection, rootkit

CLC Number: