Threats to the security and availability of the network have contributed to the use of Real-time Blackhole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. In this paper, we use nine different RBLs from three different categories to perform the evaluation of RBL tainted traffic at a large regional Internet Service Provider. © 2013 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Zhang, J., Chivukula, A., Bailey, M., Karir, M., & Liu, M. (2013). Characterization of blacklists and tainted network traffic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7799 LNCS, pp. 218–228). Springer Verlag. https://doi.org/10.1007/978-3-642-36516-4_22
Mendeley helps you to discover research relevant for your work.