Attacker Response Framework using Mobile Code


The KIPS Transactions:PartC, Vol. 11, No. 7, pp. 959-970, Dec. 2004
10.3745/KIPSTC.2004.11.7.959,   PDF Download:

Abstract

It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. C. Bang, J. O. Kim, J. C. Na, J. S. Jang, Y. S. Lee, "Attacker Response Framework using Mobile Code," The KIPS Transactions:PartC, vol. 11, no. 7, pp. 959-970, 2004. DOI: 10.3745/KIPSTC.2004.11.7.959.

[ACM Style]
Hyo Chan Bang, Jin Oh Kim, Jung Chan Na, Joong Su Jang, and Young Suk Lee. 2004. Attacker Response Framework using Mobile Code. The KIPS Transactions:PartC, 11, 7, (2004), 959-970. DOI: 10.3745/KIPSTC.2004.11.7.959.