One of the central problems in cyber security is identification of an adversary. With the advent of internet technologies remote access of resources have skyrocketed. In this changing scenario it is difficult to identify and prevent access by unauthorized users. In fact, there are many examples of attacks on individuals and organizations planted from remote locations using the Internet. These
... [Show full abstract] attacks are known to cause significant monetary losses and have caused harm to repute and privacy of organizations.