View : 663 Download: 234

Full metadata record

DC Field Value Language
dc.contributor.author채기준*
dc.contributor.author김미희*
dc.date.accessioned2016-08-28T11:08:06Z-
dc.date.available2016-08-28T11:08:06Z-
dc.date.issued2006*
dc.identifier.issn0916-8508*
dc.identifier.otherOAK-3429*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/219723-
dc.description.abstractThe boundary of a distributed denial of service (DDoS) attack, one of the most threatening attacks in a wired network, now extends to wireless mobile networks, following the appearance of a DDoS attack tool targeted at mobile phones. However, the existing defense mechanisms against such attacks in a wired network are not effective in a wireless mobile network, because of differences in their characteristics such as the mobile possibility of attack agents. In this paper, we propose a proactive defense mechanism against IP spoofing traffic for mobile networks. IP spoofing is one of the features of a DDoS attack against which it is most difficult to defend. Among the various mobile networks, we focus on the Network Mobility standard that is being established by the NEMO Working Group in the IETF. Our defense consists of following five processes: speedy detection, filtering of attack packets, identification of attack agents, isolation of attack agents, and notification to neighboring routers. We simulated and analyzed the effects on normal traffic of moving attack agents, and the results of applying our defense to a mobile network. Our simulation results show that our mechanism provides a robust defense. Copyright © 2006 The Institute of Electronics, Information and Communication Engineers.*
dc.languageEnglish*
dc.titleProactive defense mechanism against IP spoofing traffic on a NEMO environment*
dc.typeArticle*
dc.relation.issue7*
dc.relation.volumeE89-A*
dc.relation.indexSCOPUS*
dc.relation.startpage1959*
dc.relation.lastpage1967*
dc.relation.journaltitleIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences*
dc.identifier.doi10.1093/ietfec/e89-a.7.1959*
dc.identifier.wosidWOS:000238961400011*
dc.identifier.scopusid2-s2.0-33747880125*
dc.author.googleKim M.*
dc.author.googleChae K.*
dc.contributor.scopusid채기준(7102584247)*
dc.date.modifydate20240322133135*


qrcode

BROWSE