Presentation 2008-11-13
A Plan of the method of controlling the NGN route using an indivisual security policy
Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi SATO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the development of the high-speed Internet. Unlawful computer access by the user who has malice increasa on the other hand, too. The threat by unlawful computer access and an increase in traffic are the obstructions of a normal Internet user. Moreover, it is thought that the threat by unlawful computer access from the Internet and an increase in traffic hinder a normal NGN user by the connection with the Internet in NGN (Next Generation Network). Then, the threat in NGN from unlawful computer access is reduced, and it aims at the offer of the NGN environment that can be used safely, and comfortably. This paper shows that the IP packet that flows in from the Internet NGN is detected and an abnormal IP packet is detected by the edge router on the NGN exit side using the private security policy. In the edge router on the NGN entrance side, it marks an abnormal IP packet, and the control technique of the DoS (Denial of Services) attack that is one of the unlawful computer access is considered with the path control (route loop addition) that takes the delay.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Personal Information Security Policy / NGN / Routing Control Method / DoS / DDoS attacking
Paper # CQ2008-51
Date of Issue

Conference Information
Committee CQ
Conference Date 2008/11/6(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Communication Quality (CQ)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Plan of the method of controlling the NGN route using an indivisual security policy
Sub Title (in English)
Keyword(1) Personal Information Security Policy
Keyword(2) NGN
Keyword(3) Routing Control Method
Keyword(4) DoS
Keyword(5) DDoS attacking
1st Author's Name Yasuyoshi Okada
1st Author's Affiliation Institute of Information Security()
2nd Author's Name Yasuhiro Nishikawa
2nd Author's Affiliation Institute of Information Security
3rd Author's Name Naoshi SATO
3rd Author's Affiliation Institute of Information Security
Date 2008-11-13
Paper # CQ2008-51
Volume (vol) vol.108
Number (no) 287
Page pp.pp.-
#Pages 6
Date of Issue