- Title
- Towards malicious network activity mitigation through subnet reputation analysis
- Creator
- Herbert, Alan, Irwin, Barry V W
- Date
- 2016
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/427799
- Identifier
- vital:72463
- Identifier
- https://www.researchgate.net/profile/Barry-Ir-win/publication/327622788_Towards_Malicious_Network_Activity_Mitigation_through_Subnet_Reputation_Analysis/links/5b9a1a88458515310583fda6/Towards-Malicious-Network-Activity-Mitigation-through-Subnet-Reputation-Analysis.pdf
- Description
- Analysis technologies that focus on partial packet rather than full packet analysis have shown promise in detection of malicious activity on net-works. NetFlow is one such emergent protocol that is used to log net-work flows through summarizing key features of them. These logs can then be exported to external NetFlow sinks and proper configuration can see effective bandwidth bottleneck mitigation occurring on net-works. Furthermore, each NetFlow source node is configurable with its own unique ID number. This feature enables a system that knows where a NetFlow source node ID number resides physically to say which network flows are occurring from which physical locations irre-spective of the IP addresses involved in these network flows.
- Format
- 6 pages, pdf
- Language
- English
- Relation
- Proceedings of Southern African Telecommunication Networks and Applications Conference (SATNAC), Herbert, A. and Irwin, B., 2016. Towards malicious network activity mitigation through subnet reputation analysis. In Southern Africa Telecommunication Networks and Applications Conference (SATNAC) (Vol. 2016), Proceedings of Southern African Telecommunication Networks and Applications Conference (SATNAC) volume 2016 number 1 1 6 2016 Conference
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the Southern Africa Telecommunication Networks and Applications Conference (SA TNAC) Statement (https://www.satnac.org.za/)
- Hits: 47
- Visitors: 58
- Downloads: 12
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | Towards malicious network activity mitigation through subnet reputation analysis.pdf | 194 KB | Adobe Acrobat PDF | View Details Download |