DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, H | ko |
dc.contributor.author | Ahn, S | ko |
dc.contributor.author | Choi, JunKyun | ko |
dc.date.accessioned | 2010-01-06T01:23:45Z | - |
dc.date.available | 2010-01-06T01:23:45Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2006 | - |
dc.identifier.citation | COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3984, pp.829 - 838 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16162 | - |
dc.description.abstract | Network survivability nowadays has priority over everything for both network design and implementation. The key focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource occupations. Our work deals with simulation of intrusion traffic by explicitly generating data packets that contain ARP spoofing packets. In this paper we report experimental studies of simulation efficiency and network performance of simulated networks using a host isolation system to capture duplicate ARP spoofing attacks. The Virtual Local Area Network (VLAN) based network access control framework proposed in this paper works in parallel with the policy based real-time access control function to make the utmost use of the network resources and to provide a high-quality service to the user. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.subject | ACCESS | - |
dc.title | Performance analysis of dynamic host isolation system in wireless mobile networks | - |
dc.type | Article | - |
dc.identifier.wosid | 000237650900091 | - |
dc.identifier.scopusid | 2-s2.0-33745954239 | - |
dc.type.rims | ART | - |
dc.citation.volume | 3984 | - |
dc.citation.beginningpage | 829 | - |
dc.citation.endingpage | 838 | - |
dc.citation.publicationname | COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Choi, JunKyun | - |
dc.contributor.nonIdAuthor | Kim, H | - |
dc.contributor.nonIdAuthor | Ahn, S | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordPlus | ACCESS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.