Filtering Sources Of Unwanted Traffic
- 技术优势
- The algorithms are computationally efficient and thus feasible at high speeds; the optimality means that we achieve the best possible use of available filters in a TCAM.
- 技术应用
- It can be used as the logic for formulating a compact set of filtering rules (ACLs) in the TCAM of routers that want to block unwanted traffic.
- 详细技术说明
- None
- *Abstract
-
A set of algorithms that given
(i) a blacklist containing the source IP addresses of unwanted traffic and
(ii) a constraint on the number of filters,
they construct a compact set of ranges of IP addresses that should be blocked using one filter per IP range, so as to optimize the tradeoff between the unwanted and legitimate traffic that is blocked.
- *IP Issue Date
- Sep 17, 2013
- *Principal Investigation
-
Name: Karim El Defrawy
Department:
Name: Balachander Krishnamurthy
Department:
Name: Athina Markopoulou
Department:
Name: Fabio Soldo
Department:
Name: Jacobus Van Der Merwe
Department:
- 申请号码
- 8539576
- 其他
-
Additional Technologies by these Inventors
Tech ID/UC Case
20652/2008-811-0
Related Cases
2008-811-0
- 国家/地区
- 美国
欲了解更多信息,请点击 这里
