Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.1.107

Queueing Model for Traffic Loading Improvement of DDoS Attacks in Enterprise Networks  

Ha, Hyeon-Tae (경상대학교 컴퓨터과학과)
Lee, Hae-Dong (경상대학교 컴퓨터과학과)
Baek, Hyun-Chul (경상남도 진주의료원)
Kim, Sang-Bok (경상대학교 컴퓨터과학과)
Abstract
Today the company adopts to use information management method at the network base such as internet, intranet and so on for the speed of business. Therefore the security of information asset protection and continuity of business within company in relation to this is directly connected to the credibility of the company. This paper secures continuity to the certified users using queuing model for the business interruption issue caused by DDoS attack which is faced seriously today. To do this I have reflected overloaded traffic improvement process to the queuing model through the analysis of related traffic information and packet when there occurs DDoS attack with worm/virus. And through experiment I compared and analyzed traffic loading improvement for general network equipment.
Keywords
Traffic; DDoS; Queuing; Poisson;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 최양서, 오진태, 장종수, 류재철, "분산서비스거부 (DDoS) 공격 통합 대응체계 연구," 정보보호학회지, 제19권 제5호 2009.10, pp. 11-20(10pages).
2 김종순, 이상석, 김신중, 윤석민, 곽수환, "엑셀을 활용한 통계학의 이해(제2판)," 도서출판청람 2008.3.5, pp. 141-144(4pages).
3 Yun-Ji Ma, Hyun-Chul Baek, Chang-Geun Kim, Sang-Bok Kim, "Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis," International Journal of Maritime Information and Communication Sciences, v.7, no.2, 2009.6, pp.157-163.
4 David Passmore, John Freeman, "The Virtual LAN Technology Report," http://www.3com.com/nsc/200 374.html.
5 Naranker Dulay, "Stochastic Modelling of Manufacturing Systems," Dr. Naranker Dulay's Homepage(http://www.doc.ic.ac.uk/-nd/surprise_97/j ournal/vol4/wll1/main.htm).
6 김진규, 이순흠, "능동적 성능 측정 시스템의 구현," 한국콘텐츠학회논문지 제9권 제4호 2009.4, pp. 131-141(11pages).
7 김종원, 신현준, 이정일, 최일준, 오창석, "Flow 기반 점유율과 상관성 분석을 통한 유해 트래픽 탐지," 한국정보기술학회논문지, 제7권 제3호 2009.6, pp. 201-209(9pages).
8 왕정석, 권희웅, 정윤재, 곽후근, 정규식, "시그너처 해싱에 기반한 고성능 침입방지 시스템," 한국정보과학회 2007 한국컴퓨터종합학술대회 논문집 제34권 제1호(D) 2007.6, pp. 489-494(6pages).
9 Farkhod Alisherov, Nayoun Kim, Eun-suk Cho, Seok-soo Kim, "Penetration testing a VPN," 한국정보기술학회 2009년도 Green IT융합기술 워크숍 및 하계 종합 학술 대회 논문집 2009.6, pp. 903-905 (3pages)
10 신동진, 양해술, "유출트래픽 분석기반의 침입탐지 시스템 설계 및 구현," 한국정보기술학회논문지 제1권 제1호 2003.3, pp. 55-63(9pages).