• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

The intruder traceback mechanism based on active networks


Lee Young-seok, Journal of Internet Computing and Services, Vol. 6, No. 1, pp. 1-12, Feb. 2005
Full Text:
Keywords: DoS, DDoS, Active network, Traceback mechanism

Abstract

Recently, the patterns of cyber attack through internet have been various and have become more complicated and thus it is difficult to detect a network intruder effectively and to response the intrusion quickly. Therefore, It is almost not possible to chase the real location of a network intruder and to isolate the Intruder from network in UDP based DoS or DDoS attacks spoofing source IP address and in TCP based detour connection attacks. In this paper, we propose active security architecture on active network to correspond to various cyber attacks promptly. Security management framework is designed using active technology, and security control mechanism to chase and isolate a network intruder is implemented. We also test the operation of the active security mechanism implemented on test_bed according to several attack scenarios and analyze the experiment results.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Young-seok, L. (2005). The intruder traceback mechanism based on active networks. Journal of Internet Computing and Services, 6(1), 1-12.

[IEEE Style]
L. Young-seok, "The intruder traceback mechanism based on active networks," Journal of Internet Computing and Services, vol. 6, no. 1, pp. 1-12, 2005.

[ACM Style]
Lee Young-seok. 2005. The intruder traceback mechanism based on active networks. Journal of Internet Computing and Services, 6, 1, (2005), 1-12.