Àüü
ÀüÀÚ/Àü±â
Åë½Å
ÄÄÇ»ÅÍ
·Î±×ÀÎ
ȸ¿ø°¡ÀÔ
About Us
ÀÌ¿ë¾È³»
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
Æ÷Ä¿½ºiN
¿¬±¸ÀÚ Á¤º¸
¶óÀÌ¡½ºÅ¸
ÆÄ¿öiNÅͺä
¼¼ÁßÇÑ
¿¬±¸ÀÚ·á
¹®ÀÚ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñÁ¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
´Ý±â
»çÀÌÆ®¸Ê
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
ÄÄÇ»ÅÍiN
¿¬±¸ÀÚ Á¤º¸
¿¬±¸ÀÚ·á
¹®ÀÚ DB
Ȧ·Î±×·¥ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñ Á¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
IT Daily
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
¼ºñ½º ¹Ù·Î°¡±â
¼³¹®Á¶»ç
¿¬±¸À±¸®
°ü·Ã±â°ü
Please wait....
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±¹³» ³í¹®Áö
Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö >
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö
>
Á¤º¸°úÇÐȸ ³í¹®Áö I : Á¤º¸Åë½Å
Á¤º¸°úÇÐȸ ³í¹®Áö I : Á¤º¸Åë½Å
Current Result Document :
1
/ 3
´ÙÀ½°Ç
ÇѱÛÁ¦¸ñ(Korean Title)
ÀÎÅÍ³Ý AS ·¹º§ ÅäÆú·ÎÁö¿¡¼ ºÐ»ê¼ºñ½º°ÅºÎ °ø°Ý ¡ÈÄ Å½Áö
¿µ¹®Á¦¸ñ(English Title)
Detection of the Portent of Distributed DoS Attacks on the Internet AS-level Topology
ÀúÀÚ(Author)
°±¸È«
ÀÌÈñ¸¸
±èÀͱÕ
¿ÀÁøÅÂ
ÀåÁ¾¼ö
Koohong Kang
Heeman Lee
Ikkyun Kim
Jintae Oh
Jong Soo Jang
¿ø¹®¼ö·Ïó(Citation)
VOL 37 NO. 05 PP. 0339 ~ 0350 (2010. 10)
Çѱ۳»¿ë
(Korean Abstract)
°¢°¢ÀÇ AS ·¹º§¿¡¼ Á¤È®ÇÑ ¿¬°á±¸Á¶¸¦ ¾ò±â À§ÇØ µéÀÌ´Â ³ë·Â¿¡µµ ºÒ±¸ÇÏ°í À̵é AS ·¹º§ ÀÎÅÍ³Ý ÅäÆú·ÎÁö¸¦ ÀÌ¿ëÇÑ ÀÀ¿ë ¿¬±¸µéÀÌ ¸Å¿ì µå¹°´Ù. º» ³í¹®¿¡¼´Â UCLA IRL ¿¬±¸½ÇÀÌ Á¦°øÇÏ´Â µ¥ÀÌÅ͸¦ ÀÌ¿ëÇØ AS ³ëµåÀÇ ÇÏÀ§ ½ºÆ®¸² AS ºÐÆ÷ÀÇ power-laws Ư¡°ú ÀÎÅÍ³Ý ¶ó¿ìÆà Æнº ±¸Á¶¿¡ °¡Àå Áß¿äÇÑ ¿ªÇÒÀ» ÇÏ´Â AS ¸µÅ© ºÐÆ÷¸¦ »ìÆì º¸¾Ò´Ù. ¶ÇÇÑ, Çѱ¹°ú ¹Ì±¹ »çÀÌÆ®¸¦ Áß½ÉÀ¸·Î (¹ß½ÅÁö-¸ñÀûÁö) ¶ó¿ìÆà ȩ ¼ö ºÐÆ÷¸¦ Á¶»çÇÏ°í ÀÌµé ºÐÆ÷¿Í BGP ¹ë¸®-ÇÁ¸® ¶ó¿ìÆà Á¤Ã¥ Ư¡À» ÀÌ¿ëÇÏ¿© ºÐ»ê¼ºñ½º°ÅºÎ(DDoS) °ø°Ý ½Ã ¿¹»óµÇ´Â ÀÎÅÍ³Ý Æ®·¡ÇÈ ÀÓÀǼº(randomness)À» ±Ù°Å·Î DDoS °ø°Ý ¡Èĸ¦ ÀÎÅÍ³Ý AS ·¹º§¿¡¼ ¹ß°ßÇÏ´Â ¹æ¹ýÀ» Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Despite lots of efforts to obtain an accurate picture of structure at the level of individual ASes, there is a few application works using the AS-level Internet topology. In this paper, we show that the power-law fits the number of down-stream customer ASes very well and also present the distributions of AS links with the ¡°public view¡± from UCLA IRL laboratory. Moreover, we obtain the distributions of source-destination pairs of routing hops for two sites in Korea and the United States, and then we propose a new method to decide the randomness of Internet traffic using the obtained distributions and the BGP valley-free routing policy. The randomness of traffic must be a portent of outbreak of the distributed denial-of-service attacks.
Å°¿öµå(Keyword)
AS-·¹º§ ÅäÆú·ÎÁö
ºÐ»ê¼ºñ½º°ÅºÎ °ø°Ý
Æ®·¡ÇÈ ÀÓÀǼº
AS-level topology
DDoS (Distributed Denial of Service)
Traffic Randomness
ÆÄÀÏ÷ºÎ
PDF ´Ù¿î·Îµå
¸ñ·Ï
Copyright(c)
Computer Science Engineering Research Information Center
. All rights reserved.