Performance analysis of dynamic host isolation system in wireless mobile networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Network survivability nowadays has priority over everything for both network design and implementation. The key focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource occupations. Our work deals with simulation of intrusion traffic by explicitly generating data packets that contain ARP spoofing packets. In this paper we report experimental studies of simulation efficiency and network performance of simulated networks using a host isolation system to capture duplicate ARP spoofing attacks. The Virtual Local Area Network (VLAN) based network access control framework proposed in this paper works in parallel with the policy based real-time access control function to make the utmost use of the network resources and to provide a high-quality service to the user.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2006
Subtitle of host publicationInternational Conference, Proceedings - Part V
PublisherSpringer Verlag
Pages829-838
Number of pages10
ISBN (Print)3540340793, 9783540340799
DOIs
StatePublished - 2006
EventICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom
Duration: 8 May 200611 May 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3984 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceICCSA 2006: International Conference on Computational Science and Its Applications
Country/TerritoryUnited Kingdom
CityGlasgow
Period8/05/0611/05/06

Fingerprint

Dive into the research topics of 'Performance analysis of dynamic host isolation system in wireless mobile networks'. Together they form a unique fingerprint.

Cite this