By Topic

Analysis and design of an intrusion tolerance node for application in traffic shaping

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Nam-Kyun Baik ; IT Security Evaluation Division, KISA, Seoul, Korea ; Nam-hi Kang ; Hyeon-Mee Pak ; Won-Tae Sim

This study analyzes performance enhancement by proposing an intrusion tolerance technique for application to traffic shaping, which is implemented by token buckets or leaky buckets, in order to design a security node that can maintain a service by tolerating network-based denial of service attacks. As a result of the analysis, the transmission ratio of the normal traffic was increased significantly by preventing system down through input traffic adjustment and by reducing the loss ratio of the harmful traffic to a great extent, in order to sustain service availability. Consequently, the outcome of the study is expected to contribute to the design of an efficient security network structure that can resist network-based service denial attacks.

Published in:

Control, Automation and Systems, 2008. ICCAS 2008. International Conference on

Date of Conference:

14-17 Oct. 2008