원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.1 No.1
2007.07
pp.25-34
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Complex network and internetwork attacks evade the detection of intrusion detection
systems including insertions, evasions and distributed denial of service attacks. The
presence of these complex attacks along with false positives in intrusion detection systems
has resulted in inefficient detection and response to such packets in current network
infrastructure systems. In this paper we analyse complex network and internetwork attacks
and provide effective intelligent countermeasures ad strategies for containing their
adverse impact on network and internetwork infrastructures..
목차
Abstract
1. Introduction
2. Analysis of complex attacks in network infrastructures
2.1. DOS mitigation
2.2. DDOS attacks
3. Intelligent strategic countermeasures for complex infrastructureattacks
3.1. Complex attacks and network quarantine channels
3.2. Access controls
3.3. Packet rates: Packets per second
4. Mitigation of Distributed Denial of Service Attacks
5. Method
5.1. Filtering on Neighbouring Routers
5.2. Designing of specific access filters to deny external
5.3. Packet Rate Limiting
5.4. Filtering DDOS and Complex Attacks to Null interface
5.5. Applying Threshold Values to DDOS and Complex Attacks
5.6. Application of Heuristic Algorithmic Tools for Mitigation of DDOS and Complex Attacks
5.7. Datasets
5.8. Network environment
6. Results
7. Discussion
8. Conclusion
9. References
1. Introduction
2. Analysis of complex attacks in network infrastructures
2.1. DOS mitigation
2.2. DDOS attacks
3. Intelligent strategic countermeasures for complex infrastructureattacks
3.1. Complex attacks and network quarantine channels
3.2. Access controls
3.3. Packet rates: Packets per second
4. Mitigation of Distributed Denial of Service Attacks
5. Method
5.1. Filtering on Neighbouring Routers
5.2. Designing of specific access filters to deny external
5.3. Packet Rate Limiting
5.4. Filtering DDOS and Complex Attacks to Null interface
5.5. Applying Threshold Values to DDOS and Complex Attacks
5.6. Application of Heuristic Algorithmic Tools for Mitigation of DDOS and Complex Attacks
5.7. Datasets
5.8. Network environment
6. Results
7. Discussion
8. Conclusion
9. References
저자정보
참고문헌
자료제공 : 네이버학술정보