Filtering Sources Of Unwanted Traffic
- Technology Benefits
- The algorithms are computationally efficient and thus feasible at high speeds; the optimality means that we achieve the best possible use of available filters in a TCAM.
- Technology Application
- It can be used as the logic for formulating a compact set of filtering rules (ACLs) in the TCAM of routers that want to block unwanted traffic.
- Detailed Technology Description
- None
- Application No.
- 8539576
- Others
-
Additional Technologies by these Inventors
Tech ID/UC Case
20652/2008-811-0
Related Cases
2008-811-0
- *Abstract
-
A set of algorithms that given
(i) a blacklist containing the source IP addresses of unwanted traffic and
(ii) a constraint on the number of filters,
they construct a compact set of ranges of IP addresses that should be blocked using one filter per IP range, so as to optimize the tradeoff between the unwanted and legitimate traffic that is blocked.
- *IP Issue Date
- Sep 17, 2013
- *Principal Investigator
-
Name: Karim El Defrawy
Department:
Name: Balachander Krishnamurthy
Department:
Name: Athina Markopoulou
Department:
Name: Fabio Soldo
Department:
Name: Jacobus Van Der Merwe
Department:
- Country/Region
- USA
For more information, please click Here

