Characterization of Blacklists and Tainted Network Traffic

  • Jing Zhang
  • Ari Chivukula
  • Michael Bailey
  • Manish Karir
  • Mingyan Liu
Conference paper

DOI: 10.1007/978-3-642-36516-4_22

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7799)
Cite this paper as:
Zhang J., Chivukula A., Bailey M., Karir M., Liu M. (2013) Characterization of Blacklists and Tainted Network Traffic. In: Roughan M., Chang R. (eds) Passive and Active Measurement. PAM 2013. Lecture Notes in Computer Science, vol 7799. Springer, Berlin, Heidelberg

Abstract

Threats to the security and availability of the network have contributed to the use of Real-time Blackhole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. In this paper, we use nine different RBLs from three different categories to perform the evaluation of RBL tainted traffic at a large regional Internet Service Provider.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jing Zhang
    • 1
  • Ari Chivukula
    • 1
  • Michael Bailey
    • 1
  • Manish Karir
    • 2
  • Mingyan Liu
    • 1
  1. 1.University of MichiganAnn ArborUSA
  2. 2.Department of Homeland SecurityCyber Security DivisionWashington DCUSA

Personalised recommendations