DocumentCode
1621045
Title
Analysis and design of an intrusion tolerance node for application in traffic shaping
Author
Baik, Nam-Kyun ; Kang, Nam-hi ; Pak, Hyeon-Mee ; Sim, Won-Tae
Author_Institution
IT Security Evaluation Div., KISA, Seoul
fYear
2008
Firstpage
857
Lastpage
862
Abstract
This study analyzes performance enhancement by proposing an intrusion tolerance technique for application to traffic shaping, which is implemented by token buckets or leaky buckets, in order to design a security node that can maintain a service by tolerating network-based denial of service attacks. As a result of the analysis, the transmission ratio of the normal traffic was increased significantly by preventing system down through input traffic adjustment and by reducing the loss ratio of the harmful traffic to a great extent, in order to sustain service availability. Consequently, the outcome of the study is expected to contribute to the design of an efficient security network structure that can resist network-based service denial attacks.
Keywords
computer networks; telecommunication security; telecommunication traffic; intrusion tolerance node; network-based denial of service attacks; security network structure; traffic shaping; Application software; Bandwidth; Computer crime; Computer security; IP networks; Information analysis; Information security; Performance analysis; Telecommunication traffic; Traffic control; denial of service(DoS); intrusion tolerance; leaky bucket; token bucket; traffic shaping;
fLanguage
English
Publisher
ieee
Conference_Titel
Control, Automation and Systems, 2008. ICCAS 2008. International Conference on
Conference_Location
Seoul
Print_ISBN
978-89-950038-9-3
Electronic_ISBN
978-89-93215-01-4
Type
conf
DOI
10.1109/ICCAS.2008.4694647
Filename
4694647
Link To Document