Performance Analysis of Dynamic Host Isolation System in Wireless Mobile Networks

  • Hyuncheol Kim
  • Seongjin Ahn
  • Junkyun Choi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3984)


Network survivability nowadays has priority over everything for both network design and implementation. The key focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource occupations. Our work deals with simulation of intrusion traffic by explicitly generating data packets that contain ARP spoofing packets. In this paper we report experimental studies of simulation efficiency and network performance of simulated networks using a host isolation system to capture duplicate ARP spoofing attacks. The Virtual Local Area Network (VLAN) based network access control framework proposed in this paper works in parallel with the policy based real-time access control function to make the utmost use of the network resources and to provide a high-quality service to the user.


Transmission Control Protocol Network Security Network Survivability Unauthorized Access Agent Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kim, H., Ahn, S., kim, S., Chung, J.: A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 635–643. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Choi, W., Kim, H., Ahn, S., Chung, J.: Dynamic Access Control Scheme for Service-based Multi-netted Asymmetric Virtual LAN. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 137–145. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Bruschi, D., Ornaghi, A., et al.: S-ARP: a Secure Address Resolution Protocol. In: Omondi, A.R., Sedukhin, S.G. (eds.) ACSAC 2003. LNCS, vol. 2823, pp. 66–74. Springer, Heidelberg (2003)Google Scholar
  4. 4.
    Hastings, N.E., McLean, P.A.: TCP/IP spoofing fundamentals, Computers and Communications. In: Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference, pp. 218–224 (1996)Google Scholar
  5. 5.
    Ishibashi, H., Yamai, N., Abe, K., Matsuura, T.: A protection method against unauthorized access and address spoofing for open network access systems. In: Communications, Computers and signal Processing, PACRIM. 2001 IEEE Pacific Rim Conference, pp. 10–13 (2001)Google Scholar
  6. 6.
    McDonald, B., Znati, T., et al.: Comparative Analysis of Neighbor Greeting Protocols: ARP versus ES-IS. In: SIMULATION 1996, pp. 71–80 (April 1996)Google Scholar
  7. 7.
    Ruffen, D., Len, T., Yanacek, J.: Cabletron SecureFast VLAN Operational Model Version 1.8, IETF RFC 2643 (August 1999)Google Scholar
  8. 8.
    McGee, W.R., Vasireddy, S.R., et al.: A Framework for Ensuring Network Security. Bell Labs Technical Journal 8, 7–27 (2004)CrossRefGoogle Scholar
  9. 9.
    Chakrabarti, A., Manimaran, G.: Internet Infrastructure Security: A Taxonomy, IEEE Network, 13–21 (November/December 2002)Google Scholar
  10. 10.
    Templeton, S.J., Levitt, K.E.: Detecting Spoofed Packets. DISCEX 2003 1, 164–175 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hyuncheol Kim
    • 1
  • Seongjin Ahn
    • 2
  • Junkyun Choi
    • 1
  1. 1.School of EngineeringInformation and Communications UniversityDaejonKorea
  2. 2.Dept. of Computer EducationSungkyunkwan UniversitySeoulKorea

Personalised recommendations