PROBLEM TO BE SOLVED: To provide a technology of detecting the occurrence of a network attack and identifying an attack source carrying out the network attack without stopping transfer of packets and independently of simple comparison between past traffic and present traffic .;SOLUTION: A network attack detection method includes the steps of: performing control of a delay time from the reception of a packet to the transmission of the packet depending on a transmission destination when the packet returned from the transmission destination to a transmission source is received and transmitted; and judging whether or not an attack is applied to the transmission destination by making evaluation of variations in a packet amount transmitted to the transmission destination while relating the evaluation to the above control, and a network attack source identification method includes the steps of: performing control of a delay time from the reception of a packet to the transmission of the packet depending on the transmission source when the packet returned from the transmission destination to the transmission source is received and transmitted; and identifying the transmission source for applying an attack to the transmission destination by making evaluation of variations in a packet amount transmitted to the transmission destination for each transmission source while relating the evaluation to the above control.;COPYRIGHT: (C)2005,JPO&NCIPI
展开▼