Reducing unwanted traffic in a backbone network

Kuai Xu, Zhi Li Zhang, Supratik Bhattacharyya

Research output: Contribution to conferencePaperpeer-review

42 Scopus citations


This paper studies the techniques a backbone ISP can employ to reduce unwanted traffic on its network. For this purpose, we extract likely sources of exploit (thus unwanted) traffic from packet traces collected on backbone links using an Internet traffic behavior profiling methodology we developed earlier. We first study the characteristics of exploit traffic from several aspects, such as network origins and severity. Based on these characteristics, we propose several heuristic rules that an ISP may pursue for reducing unwanted traffic, and evaluate their cost and performance. Using packet traces collected from backbone links, we demonstrate that simple blocking strategies could potentially reduce substantial exploit traffic in a backbone network.

Original languageEnglish (US)
Number of pages7
StatePublished - 2005
Externally publishedYes
Event1st Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI 2005 - Cambridge, United States
Duration: Jul 7 2005 → …


Conference1st Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI 2005
Country/TerritoryUnited States
Period7/7/05 → …

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Software


Dive into the research topics of 'Reducing unwanted traffic in a backbone network'. Together they form a unique fingerprint.

Cite this