Proceedings DARPA Active Networks Conference and Exposition
DOI: 10.1109/dance.2002.1003492
|View full text |Cite
|
Sign up to set email alerts
|

IBAN: intrusion blocker based on active networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…A drawback with this approach is that after detecting a DDoS flood by a sudden increase in packet distribution no further verification of the attack is done but immediately a rate limiter is installed on the active nodes. Another approach, IBAN [4], detects worm propagations based on active networks. Therefore, a management station distributes so called scanners on active networking edge routers.…”
Section: Related Workmentioning
confidence: 99%
“…A drawback with this approach is that after detecting a DDoS flood by a sudden increase in packet distribution no further verification of the attack is done but immediately a rate limiter is installed on the active nodes. Another approach, IBAN [4], detects worm propagations based on active networks. Therefore, a management station distributes so called scanners on active networking edge routers.…”
Section: Related Workmentioning
confidence: 99%
“…Most of research on intrusion prevention focuses on preventing attacks on operating systems and computer networks [1], [2], [3], [4], [5]. Although auditing tools are , provided by most of popular DBMS and there are some works on database intrusion detection [6], [7], [8], [9], [10], [11], [12], [13], these methods focus on detecting attacks after the event, so they can not realize intrusion prevention for database.…”
Section: Introductionmentioning
confidence: 99%
“…The Intrusion Blocker based on Active Networks (IBAN) [7] then it is regarded as suspicious, transferred to the suspicious queue, and an attack profile configured. The TAC then rate controls this suspicious traffic through a configurable filter function.…”
Section: Defeating Denial Of Service Attacksmentioning
confidence: 99%