2012 International Conference on Computing, Networking and Communications (ICNC) 2012
DOI: 10.1109/iccnc.2012.6167411
|View full text |Cite
|
Sign up to set email alerts
|

On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In particular, the most common problem is that these lists are usually not updated as soon as new allocations are made, and therefore valid routes can be filtered out. Vaidyanathan et al [74] introduced in the bogon lists the semi-dark space, addresses that are not in operational use. All these works focus on IP allocation rather than ASes.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, the most common problem is that these lists are usually not updated as soon as new allocations are made, and therefore valid routes can be filtered out. Vaidyanathan et al [74] introduced in the bogon lists the semi-dark space, addresses that are not in operational use. All these works focus on IP allocation rather than ASes.…”
Section: Related Workmentioning
confidence: 99%