Abstract
ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service in traffic-intended unknown attack. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than 30%. As the proposed ATC can be applied to the edge point of backbone network as well as Internet access point, it guarantees network survivability and provides reliable Internet service.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Pescatrore, J., Easley, M., Stiennon, R.: Network security platform will transform security markets. Gartner (November 2002)
State of the NGN : Carriers and vendors must take security seriously. Gartner (March 2003)
Arbor Inc., peakflow, http://www.arbornetworks.com/productsplatform.php
Paxson, V., Floyd, S.: Wide-area traffic: The failure of poisson modeling. IEEE/ACM Transaction on networking 3(3), 226–244 (1995)
Kim, K.S., Cho, M.H., Nam, T.Y.: Analysis of Session Admission Control based on Area (SACA) for Software Download in Cellular CDMA Systems. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol. 2662, Springer, Heidelberg (2003)
Trivedi, K.S., Ma, X., Dharmaraja, S.: Performability modeling of wireless communication systems. Int. Journal of communication systems, 561–577 (May 2003)
Wolfram Inc., Mathematica V4.2, http://www.wolfram.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, K., Nam, T., Han, C. (2004). On the Security Effect of Abnormal Traffic Controller Deployed in Internet Access Point. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_87
Download citation
DOI: https://doi.org/10.1007/978-3-540-25978-7_87
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23034-2
Online ISBN: 978-3-540-25978-7
eBook Packages: Springer Book Archive