in ISP Networks
نویسندگان
چکیده
This document contains recommendations on how Internet Service Providers can use various remediation techniques to manage the effects of malicious bot infestations on computers used by their subscribers. Internet users with infected computers are exposed to risks such as loss of personal data and increased susceptibility to online fraud. Such computers can also become inadvertent participants in or components of an online crime network, spam network, and/or phishing network as well as be used as a part of a distributed denial-of-service attack. Mitigating the effects of and remediating the installations of malicious bots will make it more difficult for botnets to operate and could reduce the level of online crime on the Internet in general and/or on a particular Internet Service Provider’s network.
منابع مشابه
Efficient discovery of network topology and routing policy in the Internet
Efficient discovery of network topology and routing policy in the Internet by Neil Timothy Spring Co-Chairs of Supervisory Committee: Associate Professor David J. Wetherall Department of Computer Science and Engineering Professor Thomas E. Anderson Department of Computer Science and Engineering Little is known about the structure and configuration of the ISP networks that constitute the Interne...
متن کاملThe "Global-ISP" paradigm
We present a new paradigm, called “Global ISP” (G-ISP). Its goal is to solve, or at least alleviate, problems of inter-domain routing, such as slow convergence, and lack of QoS and multicast support. One of the most important properties of the proposed paradigm is that it can be gradually deployed on the Internet. A G-ISP can be viewed as an additional ISP that provides transit services to its ...
متن کاملAnalyzing network bandwidths of ISP topologies having power-law degree distributions
Recent measurement studies on Internet topology show that the connectivities of nodes exhibit a power–law attribute. That is, the probability p(k) that a node is connected to k other nodes follows p(k) ∼ k −γ. However, even if the degree distributions of some topologies are the same, more detailed characteristics are often quite different. For example, ISP topologies had a much higher cluster c...
متن کاملA Stochastic Analytical Modelling Framework on ISP-P2P Collaborations in Multi-domain Environments
Cooperation between peer-to-peer (P2P) overlays and underlying networks has been proposed as an effective approach to improve the efficiency of both the applications and the underlying networks. However, fundamental characteristics with respect to ISP business relationships and inter-ISP routing information are not sufficiently investigated in the context of collaborative ISP-P2P paradigms in m...
متن کاملDesigning ISP-friendly Peer-to-Peer Networks Using Game-based Control
The rapid growth of peer-to-peer (P2P) networks in the past few years has brought with it increases in transit cost to Internet Service Providers (ISPs), as peers exchange large amounts of traffic across ISP boundaries. This ISP oblivious behavior has resulted in misalignment of incentives between P2P networks—that seek to maximize user quality—and ISPs—that would seek to minimize costs. Can we...
متن کاملWhere in the Internet is congestion?
Understanding the distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable Internet service provider (ISP) networks. Using correlation-based analysis we estimate prevalence of congestion in the periphery versus the cor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012