Skip to main content

On the Security Effect of Abnormal Traffic Controller Deployed in Internet Access Point

  • Conference paper
Information Networking. Networking Technologies for Broadband and Mobile Networks (ICOIN 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3090))

Included in the following conference series:

  • 388 Accesses

Abstract

ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service in traffic-intended unknown attack. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than 30%. As the proposed ATC can be applied to the edge point of backbone network as well as Internet access point, it guarantees network survivability and provides reliable Internet service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pescatrore, J., Easley, M., Stiennon, R.: Network security platform will transform security markets. Gartner (November 2002)

    Google Scholar 

  2. State of the NGN : Carriers and vendors must take security seriously. Gartner (March 2003)

    Google Scholar 

  3. DARPA FTN, http://www.iaands.org/iaands2002/ftn/index.html

  4. Arbor Inc., peakflow, http://www.arbornetworks.com/productsplatform.php

  5. Paxson, V., Floyd, S.: Wide-area traffic: The failure of poisson modeling. IEEE/ACM Transaction on networking 3(3), 226–244 (1995)

    Article  Google Scholar 

  6. Kim, K.S., Cho, M.H., Nam, T.Y.: Analysis of Session Admission Control based on Area (SACA) for Software Download in Cellular CDMA Systems. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol. 2662, Springer, Heidelberg (2003)

    Google Scholar 

  7. Trivedi, K.S., Ma, X., Dharmaraja, S.: Performability modeling of wireless communication systems. Int. Journal of communication systems, 561–577 (May 2003)

    Google Scholar 

  8. Wolfram Inc., Mathematica V4.2, http://www.wolfram.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, K., Nam, T., Han, C. (2004). On the Security Effect of Abnormal Traffic Controller Deployed in Internet Access Point. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_87

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25978-7_87

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23034-2

  • Online ISBN: 978-3-540-25978-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics