Title :
Background Traffic Generation System Development for the Performance Evaluation of Information Security System
Author :
Jeong, Gyoo-Yeong ; Kim, Jeong-Ho
Author_Institution :
Infomation Manage. Team, Electron. & Telecommun. Res. Inst., Daejeon
Abstract :
The response to the virus or the hacking programs is divided into two kinds of means. The first one is to use the vaccine of individual clients or the personal firewalls and IDS in the endpoint of a network and the equipment for connecting an endpoint, and IPS. The other one is access restriction by the security system including firewalls, and so on. In case of security systems, it is obvious that some experiments are to be performed in the environment which is very similar to the real Internet environment. But. there are many problems for providing such environment. Particularly, it is more difficult in the case of the background traffic because many connections are required continuously and various types of services and data are needed to send or receive for the maintenance. For this reason, in this paper, we propose the system which produces a great number of background traffic. It constructs the environment like the real Internet and generates a large amount of harmful traffic. It is based on snort rule and it can also conduct the performance test of the security system.
Keywords :
Internet; computer networks; computer viruses; security of data; telecommunication congestion control; Internet; access restriction; background traffic generation system; hacking programs; information security system; personal firewalls; snort rule; Computer crime; Information analysis; Information security; Internet; Intrusion detection; Joining processes; Protocols; System testing; Telecommunication traffic; Vaccines;
Conference_Titel :
Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
Conference_Location :
Gangwon-Do
Print_ISBN :
978-89-5519-136-3
DOI :
10.1109/ICACT.2008.4494088