DOI QR코드

DOI QR Code

The Study of Efficiency of System Architecture According to the Modeling of 40G Aladdin System and Input Traffic

40G급 Aladdin 시스템의 모델링 및 입력 트래픽에 따른 시스템 구조 효율성 연구

  • 황유동 (순천향대학교 전기전자공학과대학원 정보보호전공) ;
  • 박동규 (순천향대학교 정보통신공학과) ;
  • 장종수 (한국전자통신연구원)
  • Received : 2012.05.25
  • Accepted : 2012.08.13
  • Published : 2012.08.28

Abstract

In this paper, the structure of the Aladdin system was modeled by Petri nets for performance evaluation of 40G bps class Aladdin system which was developed in ETRI as the high-speed DDoS defensive tool. The efficiency analysis of the system architecture according to the input traffic of the Aladdin system was performed based on the modeling.

본 논문에서는 고속의 DDoS 방어도구로 한국 전자통신 연구원에서 개발 중인 40G bps급 Aladdin 시스템의 성능 평가를 위하여 패트리네트로 Aladdin 시스템을 모델링하였고, 이를 기반으로 Aladdin 시스템의 입력 트래픽에 따른 시스템 구조 효율성 분석을 수행하였다.

Keywords

References

  1. 유승엽, 박동규, 오진태, 전인오, "ALADDIN의 어플리케이션 계층 공격 탐지 블록 ALAB 알고리즘의 최적 임계값 도출 및 알고리즘 확장", 정보처리학회지 제18-C권 제 3호, 2011
  2. 유승엽, 박동규, 장종수, "URI 및 브라우저 행동 패턴의 특성을 이용한 HTTP get flooding 공격 탐지 알고리즘", 한국정보기술학회지 제9권 제1호 159p-170p, 2011
  3. Markus J, Zulfikar R., "Crimeware: Understanding New Attacks and Defenses", Addison Wesley Professional, ISBN 0-321-50195-0, April 2008.
  4. Tuncer, T. and Tatar, Y. 2008 Detection SYN Flooding Attacks Using Fuzzy Logic. Proc. Int. Conf. Information Security and Assurance ISA'08, Washington, DC, USA, April 24-26, p. 321-325. IEEE Computer Society, NewYork, NY, USA
  5. U.Payer, M.Lamberger, and P.Teufl. Hybrid engine for polymorphic code detection. In Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pages 19-31
  6. Takeshi Yatagai, et al., "A HTTP Flooding Detection Method Based on Browser Behavior", 2007.
  7. Jinghe Jin, Nazarov Nodir, Chaetae Im, and Seung Yeob Nam, "Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router", 1st Asia NetFPGA Developers Workshop, Daejeon, Korea, June 14, 2010.
  8. KINDER, J., KATZENBEISSER, S., SCHALLHART, C., and VEITH, H. "Detecting Malicious Code by Model Checking" In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2005.
  9. TADAO MURATA, "Petri Nets:Properties, Analysis and Applications", PROCEEDING OF THE IEEE, VOL. 77, NO. 4, APRIL 1989
  10. D.A.Zaitsev, T.R.Shmeleva, "Simulating of Telecommunication Systems with CPN Tools", Nov. 2006
  11. http://www.cpntools.org/