A Study on Trace-Back Method of Financial Network Using IP Marking Server

Keunho Park, Ken Choi, TaeShik Shon

Abstract


With the advent of FinTech, many financial services have become available in the mobile Internet environment and recently, there is an internet bank that provides all bank services online. As the proportion of financial services over the Internet increases, it offers convenience to users, but at the same time, the threat of financial network is increasing. Financial institutions are investing heavily in security systems in case of an intrusion. However attacks by hackers are getting more sophisticated and difficult to cope with. However, applying an IP Trace-back method that can detect the actual location of an attacker to a financial network can prepare for an attacker’s arrest and additional attacks. In this paper, we investigate IP Trace-back technology that can detect the actual location of attacker and analyze it to apply it to financial network. And we propose a new IP Trace-back method through Infra-structure construction through simulation experiments.


Full Text:

PDF

References


Arena Simulation Software, https://www. arenasimulation.com/.

Belenky, A. and Ansari, N., “IP traceback with deterministic packet marking,” IEEE communications letters, Vol. 7, No. 4, pp. 162-164, 2003.

DARPA 1999 Intrusion Detection Data Sets, https://ll.mit.edu/ideval/data/.

Foroushani, V. A. and Zincir-Heywood, A. N., “Deterministic and authenticated flow marking for IP traceback,” Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on. IEEE, 2013.

Incident Response Team and Incident countermeasure planning team of Financial Security Institute, “Effective response to the financial crisis,” 2015.

Kuhl et al., “Cyber attack modeling and simulation for network security analysis,” Proceedings of the 39th Conference on Winter Simulation: 40 years! The best is yet to come, IEEE Press, 2007.

Park, E. Y. and Yoon, J. W., “A study of accident prevention effect through anomaly analysis in E-banking,” The Journal of Society for e-Business Studies, Vol. 19, No. 4, pp. 119-134, 2014.

Savage, S., Wetherall, D., Karlin, a., and Anderson, T., “Network support for IP traceback,” IEEE/ACM Transaction on Networking, Vol. 9, No. 3, pp. 226-237, 2001.

Savage, S., Wetherall, D., Karlin, a., and Anderson, T., “Practical network support for IP traceback,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 4, pp. 295-306, 2000.

Song, D. X. and Perrig, A., “Advanced and authenticated marking schemes for IP traceback,” INFOCOM 2001, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, IEEE, Vol. 2, pp. 878-886, 2001.


Refbacks

  • There are currently no refbacks.