Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 채기준 | * |
dc.date.accessioned | 2018-06-02T08:14:17Z | - |
dc.date.available | 2018-06-02T08:14:17Z | - |
dc.date.issued | 2004 | * |
dc.identifier.issn | 0302-9743 | * |
dc.identifier.other | OAK-17632 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/244066 | - |
dc.description.abstract | Recently, as the serious damage caused by spoofed traffic like DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not provide effective defense against these attacks, and cannot especially identify the origin generating the spoofed traffic. In this paper, we describe a simple and practical solution that supports the immediate detection and identification for spoofing attack agent. Proposed agent needs only one per a router, and the modification of legacy routers is not required. So, if agents as many as routers are distributed, they can perfectly detect the spoofed traffic generated on themselves network, and directly identify the attack agent, regardless of spoofing level. We implement the proposed mechanism, experiment with strong DDoS tool on the real network, and confirm the effectiveness of our design. © Springer-Verlag 2004. | * |
dc.language | English | * |
dc.title | Detection and identification mechanism against spoofed traffic using distributed agents | * |
dc.type | Article | * |
dc.relation.volume | 3043 | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 673 | * |
dc.relation.lastpage | 682 | * |
dc.relation.journaltitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | * |
dc.identifier.scopusid | 2-s2.0-33645596804 | * |
dc.author.google | Kim M. | * |
dc.author.google | Chae K. | * |
dc.contributor.scopusid | 채기준(7102584247) | * |
dc.date.modifydate | 20240322133135 | * |