• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Response Methodology against Spoofed IP Attack using Active Networks Mechanism


Sang-Hyun Park, Haeng-Seok Ko, Oh-Seok Kwon, Journal of Internet Computing and Services, Vol. 9, No. 2, pp. 69-82, Apr. 2008
Full Text:
Keywords: Active network, Spoofed IP Attack, Attacker Isolation

Abstract

It has become more difficult to correspond a cyber attack quickly as patterns of attack become various and complex. However, current security mechanism just have passive defense functionalities. In this paper, we propose new network security mechanism to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed mechanism makes it possible to deal effectively with cyber attacks such as IP spoofing, by using active packet technology including a mobile code on active network. Also, it is designed to hove more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Park, S., Ko, H., & Kwon, O. (2008). Response Methodology against Spoofed IP Attack using Active Networks Mechanism. Journal of Internet Computing and Services, 9(2), 69-82.

[IEEE Style]
S. Park, H. Ko, O. Kwon, "Response Methodology against Spoofed IP Attack using Active Networks Mechanism," Journal of Internet Computing and Services, vol. 9, no. 2, pp. 69-82, 2008.

[ACM Style]
Sang-Hyun Park, Haeng-Seok Ko, and Oh-Seok Kwon. 2008. Response Methodology against Spoofed IP Attack using Active Networks Mechanism. Journal of Internet Computing and Services, 9, 2, (2008), 69-82.