DocumentCode :
3266472
Title :
ACtive edge-Tagging (ACT): an intruder identification and isolation scheme in active networks
Author :
Kim, Gitae ; Bogovic, Tony ; Chee, Dana
Author_Institution :
Telcordia Technol. Inc., Morristown, NJ, USA
fYear :
2001
fDate :
2001
Firstpage :
29
Lastpage :
34
Abstract :
As client/server-based network communications becomes ever-increasingly widespread with the rapid growth of the Internet, security problems have emerged as one of the most pressing issues in the Internet community. Despite the best effort of the Internet community to minimize security problems, vulnerabilities in the network still exist, and various lapses in security have demonstrated the destruction of data integrity and resource availability in the Internet. In particular, a series of occurrences of distributed denial of service (DDoS) have proven to be a challenging issue for Internet service providers (ISPs) and content providers alike. We present a novel approach, ACtive edgeTagging (ACT), which facilitates the handling of source-spoofed attacks by effectively detecting, identifying, and isolating intrusions in the network layer. Unlike the existing solutions, ACT deals with the targeted attacks efficiently without over-bearing requirements or mandatory participation of every individual network in the Internet. ACT is particularly effective for identifying and isolating attackers employing DDoS type of intrusion schemes, and it is highly scalable and extensible as well as feasible to implement in large-scale networks such as the global Internet
Keywords :
Internet; client-server systems; protocols; security of data; telecommunication security; ACT; ISP; Internet; Internet content providers; Internet service providers; active edge-tagging; active networks; client/server-based network; data integrity; distributed denial of service; intruder identification; intruder isolation; intrusion detection; large-scale networks; network layer; random forged IP source; resource availability; scalable intruder identification protocol; security problems; source-spoofed attacks; Computer crime; Data security; Filtering; IP networks; Intelligent networks; Isolation technology; Routing; Space technology; Unicast; Web and internet services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2001. Proceedings. Sixth IEEE Symposium on
Conference_Location :
Hammamet
ISSN :
1530-1346
Print_ISBN :
0-7695-1177-5
Type :
conf
DOI :
10.1109/ISCC.2001.935351
Filename :
935351
Link To Document :
بازگشت