International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

We have considered the problem of blocking malicious traffic on the Internet via optimal source-based filtering. In particular, we can consider filtering via access control lists (ACLs): These are already available at the routers, but they are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation (by filtering source prefixes instead of individual IP addresses) helps the less number of filters, but also at the cost of blocking legitimate traffic originating from the filtered prefixes. We have show how to optimally choose which source prefixes to filter for a variety of realistic attack scenarios and operators policies. In each scenario, we have design optimal, yet to be computationally efficient, algorithms. Using logs from the Dshield.org, We evaluate the algorithms and demonstrate that they bring significant benefit in practice.

Keywords: Network Security, Internet, Clustering Algorithms, Filtering

Edition: Volume 3 Issue 9, September 2014

Pages: 1373 - 1376


How to Cite this Article?

Pikkili Mahendra, K. Raghavendra Rao, "Filtering of Malicious Traffic Based on Optimal Source", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14412, Volume 3 Issue 9, September 2014, 1373 - 1376

23 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network Security'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this article



Similar Articles with Keyword 'Internet'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 1151 - 1153

Search Engine Optimization (SEO) Techniques

Kanika Arora

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1595 - 1596

User Privacy Protection in Personalised Web Search

Siva B, Merlin Shoerio

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 320 - 323

Cyber Security - Importance, Effects and Prevention

Shivali Gautam

Share this article



Similar Articles with Keyword 'Clustering Algorithms'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1947 - 1949

Study on Search Behaviours Using Task Trail

P. Sreelekha, J. Ravikumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3012 - 3016

Survey of Correlated Probabilistic Graph

Sawant Ashlesha G., Gadekar Devendra P

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 820 - 824

Clustering Medical Data Using Subspace and Parallel Approximation Algorithm

B. Thenmozhi, P. Shanthi

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2218 - 2220

A Review of Modern Document Clustering Algorithm

Priti B. Kudal, Prof. Manisha Naoghare

Share this article



Similar Articles with Keyword 'Filtering'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1333 - 1335

Mobile Video Recommendation System on Cloud with User Behavior

Latika Gaddam, Pratibha Yalagi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1126 - 1131

A Colorization Algorithm with Artifacts Suppression on Real Time Video

Sneha P. Mete, Mayur S. Dhait

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1304 - 1307

A Survey Paper on Mining Keywords Using Text Summarization Extraction System for Summary Generation over Multiple Documents

Parmar Paresh B., Ketan Patel

Share this article
Top