International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 103

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao


Abstract: We have considered the problem of blocking malicious traffic on the Internet via optimal source-based filtering. In particular, we can consider filtering via access control lists (ACLs): These are already available at the routers, but they are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation (by filtering source prefixes instead of individual IP addresses) helps the less number of filters, but also at the cost of blocking legitimate traffic originating from the filtered prefixes. We have show how to optimally choose which source prefixes to filter for a variety of realistic attack scenarios and operators policies. In each scenario, we have design optimal, yet to be computationally efficient, algorithms. Using logs from the Dshield. org, We evaluate the algorithms and demonstrate that they bring significant benefit in practice.


Keywords: Network Security, Internet, Clustering Algorithms, Filtering


Edition: Volume 3 Issue 9, September 2014,


Pages: 1373 - 1376


How to Cite this Article?

Pikkili Mahendra, K. Raghavendra Rao, "Filtering of Malicious Traffic Based on Optimal Source", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SEP14412, Volume 3 Issue 9, September 2014, 1373 - 1376

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Network Security'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Similar Articles with Keyword 'Internet'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 720 - 724

Review on Deep Learning and IoT Techniques on Corono Virus

Mansi Kambli

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 368 - 371

A Survey on Different IP Address Lookup Approaches

Manohar Nelli V

Share this Article

Similar Articles with Keyword 'Clustering Algorithms'

Downloads: 99

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1634 - 1638

Performance Comparison of Hard and Fuzzy Clustering Algorithms on ESTs of Human Genes

Abhilasha Chaudhuri, Asha Ambhaikar

Share this Article

Similar Articles with Keyword 'Filtering'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Downloads: 39

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1663 - 1668

PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM

Muneeb Manzoor Bhat, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'Network'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article
Top