Characterization of blacklists and tainted network traffic

7Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Threats to the security and availability of the network have contributed to the use of Real-time Blackhole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. In this paper, we use nine different RBLs from three different categories to perform the evaluation of RBL tainted traffic at a large regional Internet Service Provider. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Zhang, J., Chivukula, A., Bailey, M., Karir, M., & Liu, M. (2013). Characterization of blacklists and tainted network traffic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7799 LNCS, pp. 218–228). Springer Verlag. https://doi.org/10.1007/978-3-642-36516-4_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free