To read this content please select one of the options below:

Stealth tracing: Subliminal Traceroute

H.J.A. (Rens) de Wolf (Faculty of Information Technology and Systems, Delft University of Technology, Delft, The Netherlands)
Marcel E.M. Spruit (Faculty of Information Technology and Systems, Delft University of Technology, Delft, The Netherlands)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 August 2003

548

Abstract

The defence against ICT attacks requires detection of probes as early as possible. The earlier an attack is discovered, the more time defenders of systems have to take appropriate counter‐measures. This article discusses a stealth tracing technique called Subliminal Traceroute and the development of a software tool that implements this technique. The tool offers detection features, as well as a counter‐intelligence feature which tries to pin‐point the attacker.

Keywords

Citation

de Wolf, H.J.A.(R). and Spruit, M.E.M. (2003), "Stealth tracing: Subliminal Traceroute", Information Management & Computer Security, Vol. 11 No. 3, pp. 123-129. https://doi.org/10.1108/09685220310480408

Publisher

:

MCB UP Ltd

Copyright © 2003, MCB UP Limited

Related articles