Reducing Unwanted Traffic in a Backbone Network
نویسندگان
چکیده
This paper studies the techniques a backbone ISP can employ to reduce unwanted traffic on its network. For this purpose, we extract likely sources of exploit (thus unwanted) traffic from packet traces collected on backbone links using an Internet traffic behavior profiling methodology we developed earlier. We first study the characteristics of exploit traffic from several aspects, such as network origins and severity. Based on these characteristics, we propose several heuristic rules that an ISP may pursue for reducing unwanted traffic, and evaluate their cost and performance. Using packet traces collected from backbone links, we demonstrate that simple blocking strategies could potentially reduce substantial exploit traffic in a backbone network.
منابع مشابه
Advanced operations research techniques for multi-constraint QoS routing in internet
Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...
متن کاملShutUp: End-to-End Containment of Unwanted Traffic
All approaches to handling unwanted traffic consider the source hostile to the interests of the recipient, and therefore enlist the cooperation of routers to block traffic. Recent advances in trusted platforms and virtual machines make the time ripe for questioning the necessity and appropriateness of involving the middle. Specifically, existing solutions overlook a simpler, more natural, appro...
متن کاملStopping Unwanted Traffic using Lightweight Permits ⋆
One of key security issues on the current Internet is unwanted traffic, the forerunner of unauthorized accesses, intrusions, Denial of Service (DoS) attacks, port scanning, and other attacks. Since stopping unwanted traffic is vitally important but extremely challenging, we need a series of defensive schemes to identify unwanted packets, filter them out, and further defeat their associated atta...
متن کاملMethods of Reducing the Number of Effective ODs in Order to Solve Traffic Equilibrium Problem in Real Life Networks
Solving traffic equilibrium problem, or “traffic assignment”, as the last step in Transportation Planning, distributes OD trip demands of a transportation network over the network links with regard to Traffic Equilibrium Law, and estimates the link flows. In formulations of traffic equilibrium which are based on path saving, the memory consumption is considerably affected by the number of effct...
متن کاملMethods of Reducing the Number of Effective ODs in Order to Solve Traffic Equilibrium Problem in Real Life Networks
Solving traffic equilibrium problem, or “traffic assignment”, as the last step in Transportation Planning, distributes OD trip demands of a transportation network over the network links with regard to Traffic Equilibrium Law, and estimates the link flows. In formulations of traffic equilibrium which are based on path saving, the memory consumption is considerably affected by the number of effct...
متن کامل