메뉴 건너뛰기




Volumn 20, Issue 2, 2012, Pages 381-395

Optimal source-based filtering of malicious traffic

Author keywords

Clustering algorithms; filtering; Internet; network security

Indexed keywords

ACCESS CONTROL LISTS; ATTACK SCENARIOS; COMPUTATIONALLY EFFICIENT; IP ADDRESSS; MALICIOUS TRAFFIC; SCARCE RESOURCES; TERNARY CONTENT ADDRESSABLE MEMORIES;

EID: 84859991654     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2011.2161615     Document Type: Article
Times cited : (26)

References (34)
  • 1
    • 84860011139 scopus 로고    scopus 로고
    • Cisco Systems, San Jose CA
    • "Understanding ACL on Catalyst 6500 series switches," Cisco Systems, San Jose, CA, 2003 [Online]. Available: http://www.cisco.com/en/US/ products/hw/switches/ps708/products-white-paper09186a00800c9470.shtml
    • (2003) Understanding ACL on Catalyst 6500 Series Switches
  • 4
    • 51349126234 scopus 로고    scopus 로고
    • Spatial-temporal characteristics of internet malicious sources
    • Phoenix, AZ May
    • Z. Chen, C. Ji, and P. Barford, "Spatial-temporal characteristics of internet malicious sources," in Proc. IEEE INFOCOM Mini-Conf., Phoenix, AZ, May 2008, pp. 2306-2314.
    • (2008) Proc. IEEE INFOCOM Mini-Conf. , pp. 2306-2314
    • Chen, Z.1    Ji, C.2    Barford, P.3
  • 6
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • DOI 10.1145/1151659.1159947
    • A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, Pisa, Italy, Sep. 2006, pp. 291-302. (Pubitemid 44623735)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 10
    • 84859974958 scopus 로고    scopus 로고
    • Dshield: Cooperative network security community-Internet security
    • "Dshield: Cooperative network security community-Internet security," Dshield.org [Online]. Available: http://www.dshield.org
    • Dshield.org
  • 15
    • 50049083120 scopus 로고    scopus 로고
    • On filtering of DDoS attacks based on source address prefixes
    • Istanbul, Turkey Sep.
    • G. Pack, J. Yoon, E. Collins, and C. Estan, "On filtering of DDoS attacks based on source address prefixes," presented at the SecureComm, Istanbul, Turkey, Sep. 2006.
    • (2006) The SecureComm
    • Pack, G.1    Yoon, J.2    Collins, E.3    Estan, C.4
  • 17
    • 34548324846 scopus 로고    scopus 로고
    • Measuring network-aware worm spreading ability
    • DOI 10.1109/INFCOM.2007.22, 4215604, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • Z. Chen and C. Ji, "Measuring network-aware worm spreading ability," in Proc. IEEE INFOCOM, Anchorage, AK, May 2007, pp. 116-124. (Pubitemid 47334222)
    • (2007) Proceedings - IEEE INFOCOM , pp. 116-124
    • Chen, Z.1    Ji, C.2
  • 18
    • 16444383160 scopus 로고    scopus 로고
    • Survey of clustering algorithms
    • DOI 10.1109/TNN.2005.845141
    • R. Xu and D. Wunsch, II, "Survey of clustering algorithms," IEEE Trans. Neural Netw., vol. 16, no. 3, pp. 645-678, May 2005. (Pubitemid 40718010)
    • (2005) IEEE Transactions on Neural Networks , vol.16 , Issue.3 , pp. 645-678
    • Xu, R.1    Wunsch II, D.2
  • 20
    • 69249233518 scopus 로고    scopus 로고
    • Scalable network-layer defense against internet bandwidth-flooding attacks
    • Aug.
    • K. Argyraki and D. Cheriton, "Scalable network-layer defense against internet bandwidth-flooding attacks," IEEE/ACMTrans. Netw., vol. 17, no. 4, pp. 1284-1297, Aug. 2009.
    • (2009) IEEE/ACMTrans. Netw. , vol.17 , Issue.4 , pp. 1284-1297
    • Argyraki, K.1    Cheriton, D.2
  • 21
    • 65249149520 scopus 로고    scopus 로고
    • To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
    • Seattle, WA Aug.
    • X. Liu, X. Yang, and Y. Lu, "To filter or to authorize: Network-layer DoS defense against multimillion-node botnets," in Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008, pp. 195-206.
    • (2008) Proc. ACM SIGCOMM , pp. 195-206
    • Liu, X.1    Yang, X.2    Lu, Y.3
  • 22
    • 84859999208 scopus 로고    scopus 로고
    • High performance packet classification
    • "High performance packet classification," HiPAC.org [Online]. Available: http://www.hipac.org/performance-tests/results.html
    • HiPAC.org
  • 23
    • 84859999206 scopus 로고    scopus 로고
    • DePaul University, Chicago IL
    • E. Al-Shaer and H. Hamed, "Firewall policy advisor," DePaul University, Chicago, IL, 2005 [Online]. Available: http://www.mnlab. cs.depaul.edu/projects/SPA
    • (2005) Firewall Policy Advisor
    • Al-Shaer, E.1    Hamed, H.2
  • 24
    • 84858728623 scopus 로고    scopus 로고
    • Tracking dynamic sources of malicious activity at internet-scale
    • BC, Canada Dec.
    • S. Venkataraman, A. Blum, D. Song, S. Sen, and O. Spatscheck, "Tracking dynamic sources of malicious activity at internet-scale," presented at the NIPS Whistler, BC, Canada, Dec. 2009.
    • (2009) The NIPS Whistler
    • Venkataraman, S.1    Blum, A.2    Song, D.3    Sen, S.4    Spatscheck, O.5
  • 26
    • 1242310086 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Karlsruhe, Germany Aug.
    • C. Estan, S. Savage, and G.Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proc. ACMSIGCOMM, Karlsruhe, Germany, Aug. 2003, pp. 137-148.
    • (2003) Proc. ACMSIGCOMM , pp. 137-148
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 27
    • 3142735161 scopus 로고    scopus 로고
    • Diamond in the rough: Finding hierarchical heavy hitters in multi-dimensional data
    • Paris, France Jun.
    • G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, "Diamond in the rough: Finding hierarchical heavy hitters in multi-dimensional data," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Paris, France, Jun. 2004, pp. 155-166.
    • (2004) Proc. ACM SIGMOD Int. Conf. Manage. Data , pp. 155-166
    • Cormode, G.1    Korn, F.2    Muthukrishnan, S.3    Srivastava, D.4
  • 28
    • 0000143954 scopus 로고
    • A linear programming approach to the cutting stock problem-Part II
    • P. Gilmore and R. Gomory, "A linear programming approach to the cutting stock problem-Part II," Oper. Res., vol. 11, no. 6, pp. 863-888, 1963.
    • (1963) Oper. Res. , vol.11 , Issue.6 , pp. 863-888
    • Gilmore, P.1    Gomory, R.2
  • 29
    • 0033879594 scopus 로고    scopus 로고
    • Approximation algorithms for knapsack problems with cardinality constraints
    • DOI 10.1016/S0377-2217(99)00261-1
    • A. Caprara, H. Kellerer, U. Pferschy, and D. Pisinger, "Approximation algorithms for knapsack problems with cardinality constraints," Eur. J. Oper. Res., vol. 123, no. 2, pp. 333-345, 2000. (Pubitemid 30596940)
    • (2000) European Journal of Operational Research , vol.123 , Issue.2 , pp. 333-345
    • Caprara, A.1    Kellerer, H.2    Pferschy, U.3    Pisinger, D.4
  • 30
    • 5644249597 scopus 로고    scopus 로고
    • Solving multidimensional knapsack problems with generalized upper bound constraints using critical event tabu search
    • V. Li and G. Curry, "Solving multidimensional knapsack problems with generalized upper bound constraints using critical event tabu search," Comput. Oper. Res., vol. 32, no. 4, pp. 825-848, 2005.
    • (2005) Comput. Oper. Res. , vol.32 , Issue.4 , pp. 825-848
    • Li, V.1    Curry, G.2
  • 31
    • 0030110028 scopus 로고    scopus 로고
    • LP relaxation of the two dimensional knapsack problem with box and GUB constraints
    • DOI 10.1016/0377-2217(94)00285-1
    • A. Bagchi, N. Bhattacharyya, and N. Chakravarti, "LP relaxation of the two dimensional knapsack problem with box and GUB constraints," Eur. J. Oper. Res., vol. 89, no. 3, pp. 609-617, 1996. (Pubitemid 126386792)
    • (1996) European Journal of Operational Research , vol.89 , Issue.3 , pp. 609-617
    • Bagchi, A.1    Bhattacharyya, N.2    Chakravarti, N.3
  • 32
    • 14944345436 scopus 로고    scopus 로고
    • A polyhedral study of the cardinality constrained knapsack problem
    • I. de Farias, Jr and G. Nemhauser, "A polyhedral study of the cardinality constrained knapsack problem," Math. Program., vol. 96, no. 3, pp. 439-467, 2003.
    • (2003) Math. Program. , vol.96 , Issue.3 , pp. 439-467
    • De Farias Jr., I.1    Nemhauser, G.2
  • 33
    • 70349658385 scopus 로고    scopus 로고
    • Optimal filtering of source address prefixes: Models and algorithms
    • Rio de Janeiro, Brazil Apr.
    • F. Soldo, A. Markopoulou, and K. Argyraki, "Optimal filtering of source address prefixes: Models and algorithms," in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 2446-2454.
    • (2009) Proc. IEEE INFOCOM , pp. 2446-2454
    • Soldo, F.1    Markopoulou, A.2    Argyraki, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.