• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

Current Result Document : 1 / 2   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis
¿µ¹®Á¦¸ñ(English Title) Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis
ÀúÀÚ(Author) Yun-Ji Ma   Hyun-Chul Baek   Chang-Geun Kim   Sang-Bok Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 07 NO. 02 PP. 0157 ~ 0163 (2009. 06)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial infor-mation or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.
Å°¿öµå(Keyword) DDoS attacks   Network traffic   Traceback   Network security  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå