Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1251282.1251284guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Reducing unwanted traffic in a backbone network

Published: 07 July 2005 Publication History

Abstract

This paper studies the techniques a backbone ISP can employ to reduce unwanted traffic on its network. For this purpose, we extract likely sources of exploit (thus unwanted) traffic from packet traces collected on backbone links using an Internet traffic behavior profiling methodology we developed earlier. We first study the characteristics of exploit traffic from several aspects, such as network origins and severity. Based on these characteristics, we propose several heuristic rules that an ISP may pursue for reducing unwanted traffic, and evaluate their cost and performance. Using packet traces collected from backbone links, we demonstrate that simple blocking strategies could potentially reduce substantial exploit traffic in a backbone network.

References

[1]
{1} V. Yegneswaran, P. Barford and J. Ullrich, "Internet intrusions: global characteristics and prevalence," in Proc. of ACM SIGMETRICS, 2003.]]
[2]
{2} R. Pang, V. Yegneswaran, P. Barford, V. Paxson and L. Peterson, "Characteristics of Internet Background Radiation," in Proc. of ACM SIGCOMM Internet Measurement Conference, 2004.]]
[3]
{3} K. Xu, Z.-L. Zhang and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications," in Proc. of ACM SIGCOMM, August 2005.]]
[4]
{4} D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, "Inside the Slammer Worm," IEEE Security and Privacy, July 2003.]]
[5]
{5} K. Xu, Z.-L. Zhang and S. Bhattacharyya, "Reducing Unwanted Traffic in a Backbone Network," Sprint ATL Research Report RR05-ATL-040400, April 2005.]]
[6]
{6} Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, E. Lear, "RFC1918: Address Allocation for Private Internets," February 1996.]]
[7]
{7} University of Oregon, "Routeviews archive project," http://archive.routeviews.org/.]]
[8]
{8} S. Staniford, J. Hoagland, and J. McAlerney, "Practical automated detection of stealthy portscans," Journal of Computer Security, vol. 10, pp. 105-136, 2002.]]
[9]
{9} "SNORT," http://www.snort.org/.]]
[10]
{10} V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, Dec 1999.]]
[11]
{11} J. Jung and V. Paxson and A. Berger and H. Balakrishna, "Fast portscan detection using sequential hypothesis testing," in Proc. of IEEE Symposium on Security and Privacy, 2004.]]

Cited By

View all
  • (2012)Towards efficient flow sampling technique for anomaly detectionProceedings of the 4th international conference on Traffic Monitoring and Analysis10.1007/978-3-642-28534-9_11(93-106)Online publication date: 12-Mar-2012
  • (2011)Finding critical thresholds for defining burstsProceedings of the 13th international conference on Data warehousing and knowledge discovery10.5555/2033616.2033664(484-495)Online publication date: 29-Aug-2011
  • (2010)Real-time behaviour profiling for network monitoringInternational Journal of Internet Protocol Technology10.1504/IJIPT.2010.0326165:1/2(65-80)Online publication date: 1-Apr-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
July 2005
89 pages

Publisher

USENIX Association

United States

Publication History

Published: 07 July 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Towards efficient flow sampling technique for anomaly detectionProceedings of the 4th international conference on Traffic Monitoring and Analysis10.1007/978-3-642-28534-9_11(93-106)Online publication date: 12-Mar-2012
  • (2011)Finding critical thresholds for defining burstsProceedings of the 13th international conference on Data warehousing and knowledge discovery10.5555/2033616.2033664(484-495)Online publication date: 29-Aug-2011
  • (2010)Real-time behaviour profiling for network monitoringInternational Journal of Internet Protocol Technology10.1504/IJIPT.2010.0326165:1/2(65-80)Online publication date: 1-Apr-2010
  • (2010)Evaluation of bulk traffic mitigation practices in campus networkProceedings of the 6th Asian Internet Engineering Conference10.1145/1930286.1930288(9-15)Online publication date: 15-Nov-2010
  • (2010)A survey on the design, applications, and enhancements of application-layer overlay networksACM Computing Surveys10.1145/1824795.182480043:1(1-34)Online publication date: 3-Dec-2010
  • (2010)Critical infrastructure protectionJournal of Network and Computer Applications10.1016/j.jnca.2010.01.00333:4(491-502)Online publication date: 1-Jul-2010
  • (2009)Dynamic information source selection for intrusion detection systemsProceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 210.5555/1558109.1558153(1009-1016)Online publication date: 10-May-2009
  • (2009)Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probesInternational Journal of Electronic Security and Digital Forensics10.1504/IJESDF.2009.0238742:1(35-48)Online publication date: 1-Mar-2009
  • (2009)TCP portscan detection based on single packet flows and entropyProceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human10.1145/1655925.1656116(1056-1060)Online publication date: 24-Nov-2009
  • (2009)RIP - A robust IP access architectureComputers and Security10.1016/j.cose.2009.02.00228:6(359-380)Online publication date: 1-Sep-2009
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media