ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper An Efficient Algorithm for Intrusion Source Identification
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jong Hyun Kim, Jung Chan Na
Issue Date
2008-09
Citation
International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.188-190
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/NCM.2008.198
Abstract
There has been a growing interest in the design and development of intrusion detection systems for the Internet. One of the goals of these systems is to detect the source(s) of attack. Based on the position of the victim in the network, our scheme selects only a small fraction of routers to monitor the traffic and identify packets that bear signatures of the attack packets. From the information provided by these chosen routers, the network is pruned and another set of routers is chosen to identify the source of attack, until the source router is detected. By using the properties of the centroid tree, we present an efficient algorithm for identifying the source of the intrusion. © 2008 IEEE.
KSP Keywords
Efficient algorithms, Intrusion Detection Systems(IDSs), Intrusion detection system(IDS), design and development, source identification