Paper Abstract and Keywords |
Presentation |
2008-11-13 18:00
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the development of the high-speed Internet. Unlawful computer access by the user who has malice increases on the other hand, too. The threat by unlawful computer access and an increase in traffic are the obstructions of a normal Internet user. Moreover, it is thought that the threat by unlawful computer access from the Internet and an increase in traffic hinder a normal NGN user by the connection with the Internet in NGN(Next Generation Network). Then, the threat in NGN from unlawful computer access is reduced, and it aims at the offer of the NGN environment that can be used safely, and comfortably.This paper shows that the IP packet that flows in from the Internet NGN is detected and an abnormal IP packet is detected by the edge router on the NGN exit side using the private security policy. In the edge router on the NGN entrance side, it marks an abnormal IP packet, and the control technique of the DoS(Denial of Services) attack that is one of the unlawful computer access is considered with the path control (route loop addition) that takes the delay. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Personal Information Security Policy / NGN / Routing Control Method / DoS attacking / DDoS attacking / / / |
Reference Info. |
IEICE Tech. Rep., vol. 108, no. 287, CQ2008-51, pp. 33-38, Nov. 2008. |
Paper # |
CQ2008-51 |
Date of Issue |
2008-11-06 (CQ) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
CQ2008-51 |
Conference Information |
Committee |
ICM CQ NS |
Conference Date |
2008-11-13 - 2008-11-14 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Nihon University |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
NW management, Next generation NW architecture, Next generation NW operation architecture, traffic measurement/modeling/quality, overlay network, Next-Generation NW QoS, etc. |
Paper Information |
Registration To |
CQ |
Conference Code |
2008-11-ICM-CQ-NS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A plan of the method of controlling the NGN route using an indivisual security policy |
Sub Title (in English) |
|
Keyword(1) |
Personal Information Security Policy |
Keyword(2) |
NGN |
Keyword(3) |
Routing Control Method |
Keyword(4) |
DoS attacking |
Keyword(5) |
DDoS attacking |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Yasuyoshi Okada |
1st Author's Affiliation |
INSTITUTE of INFORMATION SECURITY (IISEC) |
2nd Author's Name |
Yasuhiro Nishikawa |
2nd Author's Affiliation |
INSTITUTE of INFORMATION SECURITY (IISEC) |
3rd Author's Name |
Naoshi Sato |
3rd Author's Affiliation |
INSTITUTE of INFORMATION SECURITY (IISEC) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2008-11-13 18:00:00 |
Presentation Time |
25 minutes |
Registration for |
CQ |
Paper # |
CQ2008-51 |
Volume (vol) |
vol.108 |
Number (no) |
no.287 |
Page |
pp.33-38 |
#Pages |
6 |
Date of Issue |
2008-11-06 (CQ) |
|