Performance analysis of dynamic host isolation system in wireless mobile networks

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 281
  • Download : 13
DC FieldValueLanguage
dc.contributor.authorKim, Hko
dc.contributor.authorAhn, Sko
dc.contributor.authorChoi, JunKyunko
dc.date.accessioned2010-01-06T01:23:45Z-
dc.date.available2010-01-06T01:23:45Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2006-
dc.identifier.citationCOMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3984, pp.829 - 838-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/16162-
dc.description.abstractNetwork survivability nowadays has priority over everything for both network design and implementation. The key focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource occupations. Our work deals with simulation of intrusion traffic by explicitly generating data packets that contain ARP spoofing packets. In this paper we report experimental studies of simulation efficiency and network performance of simulated networks using a host isolation system to capture duplicate ARP spoofing attacks. The Virtual Local Area Network (VLAN) based network access control framework proposed in this paper works in parallel with the policy based real-time access control function to make the utmost use of the network resources and to provide a high-quality service to the user.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherSPRINGER-VERLAG BERLIN-
dc.subjectACCESS-
dc.titlePerformance analysis of dynamic host isolation system in wireless mobile networks-
dc.typeArticle-
dc.identifier.wosid000237650900091-
dc.identifier.scopusid2-s2.0-33745954239-
dc.type.rimsART-
dc.citation.volume3984-
dc.citation.beginningpage829-
dc.citation.endingpage838-
dc.citation.publicationnameCOMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorChoi, JunKyun-
dc.contributor.nonIdAuthorKim, H-
dc.contributor.nonIdAuthorAhn, S-
dc.type.journalArticleArticle; Proceedings Paper-
dc.subject.keywordPlusACCESS-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0