International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 131 - Issue 7 |
Published: December 2015 |
Authors: Rajesh Kumar Goutam |
![]() |
Rajesh Kumar Goutam . The Problem of Attribution in Cyber Security. International Journal of Computer Applications. 131, 7 (December 2015), 34-36. DOI=10.5120/ijca2015907386
@article{ 10.5120/ijca2015907386, author = { Rajesh Kumar Goutam }, title = { The Problem of Attribution in Cyber Security }, journal = { International Journal of Computer Applications }, year = { 2015 }, volume = { 131 }, number = { 7 }, pages = { 34-36 }, doi = { 10.5120/ijca2015907386 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2015 %A Rajesh Kumar Goutam %T The Problem of Attribution in Cyber Security%T %J International Journal of Computer Applications %V 131 %N 7 %P 34-36 %R 10.5120/ijca2015907386 %I Foundation of Computer Science (FCS), NY, USA
The basic objective for the construction of internet was to provide a common platform to researchers and students to share information among them. It was not constructed to track and trace the behavior of cyber criminals. Due to this reason, it is difficult to locate the origin of cybercrime. The paper defines cybercrime with treat and vulnerability and suggests a number of different techniques which are often used by the cybercriminals to Spoofing the IP. The purpose of this paper is not only to detail about why the attribution of cybercrime is difficult but also to present TTL and step stone logic which are now being heavily used in cybercrime.