Attacker Investigation System Triggered by Information Leakage

Yuta Ikegami, Toshihiro Yamauchi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in a computer and substitutes it with dummy data, which is then sent to the outside. Moreover, a program embedded in the dummy data transmits information back from the attacker's computer to a pre-specified system for investigation. Information about the attacker can be obtained by an attacker executing the program.

Original languageEnglish
Title of host publicationProceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages24-27
Number of pages4
ISBN (Print)9781479999583
DOIs
Publication statusPublished - Jan 6 2016
Event4th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2015 - Okayama, Japan
Duration: Jul 12 2015Jul 16 2015

Other

Other4th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2015
CountryJapan
CityOkayama
Period7/12/157/16/15

Keywords

  • Attacker investigation
  • Information leakage
  • Operating system

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition

Cite this

Ikegami, Y., & Yamauchi, T. (2016). Attacker Investigation System Triggered by Information Leakage. In Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015 (pp. 24-27). [7373870] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IIAI-AAI.2015.247