Browse > Article
http://dx.doi.org/10.12815/kits.2012.11.4.121

The Study of Efficiency of System Architecture According to the Modeling of 40G Aladdin System and Input Traffic  

Hwang, Yu-Dong (순천향대학교 전기전자공학과대학원 정보보호전공)
Park, Dong-Gue (순천향대학교 정보통신공학과)
Jang, Jong-Soo (한국전자통신연구원)
Publication Information
The Journal of The Korea Institute of Intelligent Transport Systems / v.11, no.4, 2012 , pp. 121-130 More about this Journal
Abstract
In this paper, the structure of the Aladdin system was modeled by Petri nets for performance evaluation of 40G bps class Aladdin system which was developed in ETRI as the high-speed DDoS defensive tool. The efficiency analysis of the system architecture according to the input traffic of the Aladdin system was performed based on the modeling.
Keywords
DDoS; Aladdin System; Petri nets;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 유승엽, 박동규, 오진태, 전인오, "ALADDIN의 어플리케이션 계층 공격 탐지 블록 ALAB 알고리즘의 최적 임계값 도출 및 알고리즘 확장", 정보처리학회지 제18-C권 제 3호, 2011
2 유승엽, 박동규, 장종수, "URI 및 브라우저 행동 패턴의 특성을 이용한 HTTP get flooding 공격 탐지 알고리즘", 한국정보기술학회지 제9권 제1호 159p-170p, 2011
3 Markus J, Zulfikar R., "Crimeware: Understanding New Attacks and Defenses", Addison Wesley Professional, ISBN 0-321-50195-0, April 2008.
4 Tuncer, T. and Tatar, Y. 2008 Detection SYN Flooding Attacks Using Fuzzy Logic. Proc. Int. Conf. Information Security and Assurance ISA'08, Washington, DC, USA, April 24-26, p. 321-325. IEEE Computer Society, NewYork, NY, USA
5 U.Payer, M.Lamberger, and P.Teufl. Hybrid engine for polymorphic code detection. In Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pages 19-31
6 Takeshi Yatagai, et al., "A HTTP Flooding Detection Method Based on Browser Behavior", 2007.
7 Jinghe Jin, Nazarov Nodir, Chaetae Im, and Seung Yeob Nam, "Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router", 1st Asia NetFPGA Developers Workshop, Daejeon, Korea, June 14, 2010.
8 KINDER, J., KATZENBEISSER, S., SCHALLHART, C., and VEITH, H. "Detecting Malicious Code by Model Checking" In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2005.
9 TADAO MURATA, "Petri Nets:Properties, Analysis and Applications", PROCEEDING OF THE IEEE, VOL. 77, NO. 4, APRIL 1989
10 D.A.Zaitsev, T.R.Shmeleva, "Simulating of Telecommunication Systems with CPN Tools", Nov. 2006
11 http://www.cpntools.org/