International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 104

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra | K. Raghavendra Rao [5]


Abstract: We have considered the problem of blocking malicious traffic on the Internet via optimal source-based filtering. In particular, we can consider filtering via access control lists (ACLs): These are already available at the routers, but they are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation (by filtering source prefixes instead of individual IP addresses) helps the less number of filters, but also at the cost of blocking legitimate traffic originating from the filtered prefixes. We have show how to optimally choose which source prefixes to filter for a variety of realistic attack scenarios and operators policies. In each scenario, we have design optimal, yet to be computationally efficient, algorithms. Using logs from the Dshield. org, We evaluate the algorithms and demonstrate that they bring significant benefit in practice.


Keywords: Network Security, Internet, Clustering Algorithms, Filtering


Edition: Volume 3 Issue 9, September 2014,


Pages: 1373 - 1376


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Pikkili Mahendra, K. Raghavendra Rao, "Filtering of Malicious Traffic Based on Optimal Source", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 1373-1376, https://www.ijsr.net/get_abstract.php?paper_id=SEP14412

Similar Articles with Keyword 'Network Security'

Downloads: 0

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [7]

Share this Article

Downloads: 7 | Weekly Hits: ⮙7 | Monthly Hits: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 882 - 886

Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation

Manupreet Kaur

Share this Article
Top