Filtering of Malicious Traffic Based on Optimal Source
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

We have considered the problem of blocking malicious traffic on the Internet via optimal source-based filtering. In particular, we can consider filtering via access control lists (ACLs): These are already available at the routers, but they are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation (by filtering source prefixes instead of individual IP addresses) helps the less number of filters, but also at the cost of blocking legitimate traffic originating from the filtered prefixes. We have show how to optimally choose which source prefixes to filter for a variety of realistic attack scenarios and operators policies. In each scenario, we have design optimal, yet to be computationally efficient, algorithms. Using logs from the Dshield.org, We evaluate the algorithms and demonstrate that they bring significant benefit in practice.

Keywords: Network Security, Internet, Clustering Algorithms, Filtering

Edition: Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Share this Article

How to Cite this Article?

Pikkili Mahendra, K. Raghavendra Rao, "Filtering of Malicious Traffic Based on Optimal Source", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14412, Volume 3 Issue 9, September 2014, 1373 - 1376

40 PDF Views | 40 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network Security'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Similar Articles with Keyword 'Internet'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2228 - 2233

A Trusted Secured Architecture for Storage-as-a-Service (STaaS) Cloud

Sanneboina Nagaraju, K. B. V. Rama Narasimham

Share this Article

Similar Articles with Keyword 'Clustering Algorithms'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 820 - 824

Clustering Medical Data Using Subspace and Parallel Approximation Algorithm

B. Thenmozhi, P. Shanthi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2528 - 2532

Performance Evaluation of Clustering Algorithms for IP Traffic Recognition

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aashiq Ahmed, Prateek Mahajan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1947 - 1949

Study on Search Behaviours Using Task Trail

P. Sreelekha, J. Ravikumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1541 - 1545

A Review: Techniques for Clustering of Web Usage Mining

Rupinder Kaur, Simarjeet Kaur

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2113 - 2116

DMMI Methods for Theoretic Clustering using Data Mining

Ankita G. Joshi, R. R. Shelke

Share this Article

Similar Articles with Keyword 'Filtering'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 408 - 410

Movie Recommendation System using Naive Bayes Algorithm with Collaborative Filtering

Anchal Dubey, Raju Ranjan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1304 - 1307

A Survey Paper on Mining Keywords Using Text Summarization Extraction System for Summary Generation over Multiple Documents

Parmar Paresh B., Ketan Patel

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2019 - 2024

Example Based Color Transfer with Corruptive Artifacts Suppression

Nasreen Pottammel

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1477 - 1482

Example Based Color Transfer to Remove Corruptive Artifacts of Single and Multiple Reference Images

Nasreen Pottammel, Anitha

Share this Article
Top