Browse > Article

A Global TraHlc Conool Architecture For Isolating Network Attacts h Highspeed Intemet Backbone Networle  

노병희 (아주대학교 정보통신전문대학원)
Abstract
In this Paper, we W a Hovel global traffic control architecture to isolate malicious network attacks and protect network infrastructure in Internet backbone networks. Unlike existing methods based on individual packets or flows, since the proposed detection and control methods are operated on the aggregate traffic level, the computational complexity can k significantly reduced, and they are applicable to develop a global defense architecture against network attack. Experimental results show that the proposed scheme can detect the network attack symptoms very exactly and quickly and protect the network resources as well as the normal traffic flows very efficiently.
Keywords
네트워크 공격;트래픽 제어;자원 관리;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Internet Infrastructure Security: A Taconomy /
[ A.Chakrabarti;G.Manimaran ] / IEEE Networks   DOI   ScienceOn
2 Trends in Denial of Service Attack Technology /
[ K.Houle;J.weaver ] / CERT Coordination Center
3 On the Self-Similar Nature of Ethernet Traffic(extended version) /
[ W.E.Leland;M.S.Taqqu;W.Willinger;D.V.Wilson ] / IEEE/ACM Tr. on Networking   DOI   ScienceOn
4 블룸 필터를 이용한 인터넷 백본에서의 서비스 거부 공격과 스캐닝 탐지 /
[ 정은선 ] / 석사학위 논문
5 Fast, Approxinate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic /
[ V.Paxon ] / ACM SIGCOMM Computer Communication Review
6 대규모 인프라 공격에 대한 방어 기술의 발전 동향 /
[ 정유석;홍만표 ] / 정보과학회지   과학기술학회마을
7 Fast Classification, Calibration, and Visualization of Network Attacks on Backone Links /
[ H.Kim;J.Kim;S.Bahk;I.Kang ] / Technical Report
8 백본링크상에서의 네트워크 공격 트래픽 특성 분석 /
[ 노병희;유승화 ] / 한국정보과학회지   과학기술학회마을
9 A Novel Detection Methodology Of Network Attack Symptom At Aggregate Traffic Level On Highspeed Internet Backbone Links /
[ Byeong Hee Roh ] / ICT 2004
10 /
[ S.L.Marple ] / Digital Spectral Analysis With Applications
11 /
[] / The network simulator version-2 ns-2
12 Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial /
[ R.Chang ] / IEEE Communications Magazine