In this paper, we consider the problem of blocking malicious traffic on the Internet via source-based filtering. In particular, we consider filtering via access control lists (ACLs): These are already available at the routers today, but are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation (by filtering source prefixes instead of individual IP addresses) helps reduce the number of filters, but comes also at the cost of blocking legitimate traffic originating from the filtered prefixes. We show how to optimally choose which source prefixes to filter for a variety of realistic attack scenarios and operators' policies. In each scenario, we design optimal, yet computationally effic...
During the last few years, the amount of malicious traffic on the Internet has increased due to the ...
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
We recently established a new experimental Internet ser-vice for creating customized source address ...
Abstract — In this paper, we consider the problem of blocking malicious traffic on the Internet, via...
Abstract — How can we protect the network infrastructure from malicious traffic, such as scanning, m...
Nowadays on the Internet, there is a huge and growing expanse of unsought traffic like phishing, spa...
Distributed denial of service (DDoS) attacks are a grave threat to Internet services and even to the...
Traffic and spam are the main problems in the data transmission through the network. Many traffic fi...
Abstract: These days, Internet is the most essential medium for communication which is used by many ...
Traffic volume and diversity will have a major impact on the power of network intrusion detection sy...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
Distributed Denial of service (DDoS) is one of the most difficult security problems to address. Wh...
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. Whil...
In this paper, we propose an efficient method for collecting large amounts of malicious Internet tra...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
During the last few years, the amount of malicious traffic on the Internet has increased due to the ...
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
We recently established a new experimental Internet ser-vice for creating customized source address ...
Abstract — In this paper, we consider the problem of blocking malicious traffic on the Internet, via...
Abstract — How can we protect the network infrastructure from malicious traffic, such as scanning, m...
Nowadays on the Internet, there is a huge and growing expanse of unsought traffic like phishing, spa...
Distributed denial of service (DDoS) attacks are a grave threat to Internet services and even to the...
Traffic and spam are the main problems in the data transmission through the network. Many traffic fi...
Abstract: These days, Internet is the most essential medium for communication which is used by many ...
Traffic volume and diversity will have a major impact on the power of network intrusion detection sy...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
Distributed Denial of service (DDoS) is one of the most difficult security problems to address. Wh...
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. Whil...
In this paper, we propose an efficient method for collecting large amounts of malicious Internet tra...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
During the last few years, the amount of malicious traffic on the Internet has increased due to the ...
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
We recently established a new experimental Internet ser-vice for creating customized source address ...