This paper studies the techniques a backbone ISP can employ to reduce unwanted traffic on its network. For this purpose, we extract likely sources of exploit (thus unwanted) traffic from packet traces collected on backbone links using an Internet traffic behavior profiling methodology we developed earlier. We first study the characteristics of exploit traffic from several aspects, such as network origins and severity. Based on these characteristics, we propose several heuristic rules that an ISP may pursue for reducing unwanted traffic, and evaluate their cost and performance. Using packet traces collected from backbone links, we demonstrate that simple blocking strategies could potentially reduce substantial exploit traffic in a backbone network.
|Original language||English (US)|
|Number of pages||7|
|State||Published - 2005|
|Event||1st Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI 2005 - Cambridge, United States|
Duration: Jul 7 2005 → …
|Conference||1st Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI 2005|
|Period||7/7/05 → …|
Bibliographical noteFunding Information:
Kuai Xu and Zhi-Li Zhang were supported ni part by the Natonai l ceS nce Foundatoni under the grants ITR-0085824 and CNS 0435444 as well as ARDA grant AR/F30602-03-C-0243. Any opinions, findings, and conclusonsi or recommendatonsi expressed ni this paper are those of the authors and do not necessarli y reflect the view of the funding agencei s. eW thank Travsi Dawson at prSnti TA L for many helpful comments and discussonsi .
Kuai Xu and Zhi-Li Zhang were supported in part by the National Science Foundation under the grants ITR- 0085824 and CNS 0435444 as well as ARDA grant AR/F30602-03-C-0243. Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agencies. We thank Travis Dawson at Sprint ATL for many helpful comments and discussions.
© SRUTI 2005.All rights reserved.