View : 529 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author채기준*
dc.date.accessioned2018-06-02T08:14:17Z-
dc.date.available2018-06-02T08:14:17Z-
dc.date.issued2004*
dc.identifier.issn0302-9743*
dc.identifier.otherOAK-17632*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/244066-
dc.description.abstractRecently, as the serious damage caused by spoofed traffic like DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not provide effective defense against these attacks, and cannot especially identify the origin generating the spoofed traffic. In this paper, we describe a simple and practical solution that supports the immediate detection and identification for spoofing attack agent. Proposed agent needs only one per a router, and the modification of legacy routers is not required. So, if agents as many as routers are distributed, they can perfectly detect the spoofed traffic generated on themselves network, and directly identify the attack agent, regardless of spoofing level. We implement the proposed mechanism, experiment with strong DDoS tool on the real network, and confirm the effectiveness of our design. © Springer-Verlag 2004.*
dc.languageEnglish*
dc.titleDetection and identification mechanism against spoofed traffic using distributed agents*
dc.typeArticle*
dc.relation.volume3043*
dc.relation.indexSCOPUS*
dc.relation.startpage673*
dc.relation.lastpage682*
dc.relation.journaltitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)*
dc.identifier.scopusid2-s2.0-33645596804*
dc.author.googleKim M.*
dc.author.googleChae K.*
dc.contributor.scopusid채기준(7102584247)*
dc.date.modifydate20240322133135*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE