Attacker Investigation System Triggered by Information Leakage

Yuta Ikegami, Toshihiro Yamauchi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in a computer and substitutes it with dummy data, which is then sent to the outside. Moreover, a program embedded in the dummy data transmits information back from the attacker's computer to a pre-specified system for investigation. Information about the attacker can be obtained by an attacker executing the program.

Original languageEnglish
Title of host publicationProceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages24-27
Number of pages4
ISBN (Print)9781479999583
DOIs
Publication statusPublished - Jan 6 2016
Event4th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2015 - Okayama, Japan
Duration: Jul 12 2015Jul 16 2015

Other

Other4th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2015
CountryJapan
CityOkayama
Period7/12/157/16/15

Keywords

  • Attacker investigation
  • Information leakage
  • Operating system

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition

Cite this

Ikegami, Y., & Yamauchi, T. (2016). Attacker Investigation System Triggered by Information Leakage. In Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015 (pp. 24-27). [7373870] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IIAI-AAI.2015.247

Attacker Investigation System Triggered by Information Leakage. / Ikegami, Yuta; Yamauchi, Toshihiro.

Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015. Institute of Electrical and Electronics Engineers Inc., 2016. p. 24-27 7373870.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ikegami, Y & Yamauchi, T 2016, Attacker Investigation System Triggered by Information Leakage. in Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015., 7373870, Institute of Electrical and Electronics Engineers Inc., pp. 24-27, 4th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2015, Okayama, Japan, 7/12/15. https://doi.org/10.1109/IIAI-AAI.2015.247
Ikegami Y, Yamauchi T. Attacker Investigation System Triggered by Information Leakage. In Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015. Institute of Electrical and Electronics Engineers Inc. 2016. p. 24-27. 7373870 https://doi.org/10.1109/IIAI-AAI.2015.247
Ikegami, Yuta ; Yamauchi, Toshihiro. / Attacker Investigation System Triggered by Information Leakage. Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 24-27
@inproceedings{4dca6810d2c14a2ab63cfa0c31b90f0d,
title = "Attacker Investigation System Triggered by Information Leakage",
abstract = "While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in a computer and substitutes it with dummy data, which is then sent to the outside. Moreover, a program embedded in the dummy data transmits information back from the attacker's computer to a pre-specified system for investigation. Information about the attacker can be obtained by an attacker executing the program.",
keywords = "Attacker investigation, Information leakage, Operating system",
author = "Yuta Ikegami and Toshihiro Yamauchi",
year = "2016",
month = "1",
day = "6",
doi = "10.1109/IIAI-AAI.2015.247",
language = "English",
isbn = "9781479999583",
pages = "24--27",
booktitle = "Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Attacker Investigation System Triggered by Information Leakage

AU - Ikegami, Yuta

AU - Yamauchi, Toshihiro

PY - 2016/1/6

Y1 - 2016/1/6

N2 - While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in a computer and substitutes it with dummy data, which is then sent to the outside. Moreover, a program embedded in the dummy data transmits information back from the attacker's computer to a pre-specified system for investigation. Information about the attacker can be obtained by an attacker executing the program.

AB - While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in a computer and substitutes it with dummy data, which is then sent to the outside. Moreover, a program embedded in the dummy data transmits information back from the attacker's computer to a pre-specified system for investigation. Information about the attacker can be obtained by an attacker executing the program.

KW - Attacker investigation

KW - Information leakage

KW - Operating system

UR - http://www.scopus.com/inward/record.url?scp=84964335134&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84964335134&partnerID=8YFLogxK

U2 - 10.1109/IIAI-AAI.2015.247

DO - 10.1109/IIAI-AAI.2015.247

M3 - Conference contribution

SN - 9781479999583

SP - 24

EP - 27

BT - Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -