Multicast address management in the Internet: a study of the port blocking problem

EE Mohamed, H Abdel-Wahab… - The 3rd ACS/IEEE …, 2005 - ieeexplore.ieee.org
… a concrete methodology of measuring the address collision and the port blocking is required.
… We assume that the requests for ports arrive in a Poisson distribution at a rate of A requests/…

Overcoming Network Security on Host-Based Intrusion Detection System (HIDS) With IP and PORT Blocking Methods

M Abdurrohman, N Suharto… - Journal of …, 2023 - jartel.polinema.ac.id
… IP and PORT blocking on the server can be done automatically with rules that have been …
IP and PORT blocking systems with attacks on servers based on DDOS (Distributed Denial of …

Port Blocking

Technical Working Group - Port Blocking (August 1, 2013), 2013 - papers.ssrn.com
Executive Summary: The term “port blocking” refers to the practice of an Internet Service
Provider (ISP) identifying Internet traffic by the combination of port number and transport protocol…

The Internet is not a big truck: Toward quantifying network neutrality

R Beverly, S Bauer, A Berger - … Conference on Passive and Active Network …, 2007 - Springer
… Our scheme induces a large number of widely distributed hosts into sending packets to an
IP … In designing a methodology for measuring the extent and nature of Internet port blocking, …

[图书][B] Methodology to Improve Control Plane Security in SDN Environments

W Desalegn, J Shaikh, B Taye - 2024 - books.google.com
… of distributed denial of service (DDoS) attacks on the control plane. The proposed methodology
… , coupled with swift port blocking mechanisms, the methodology stands as a formidable …

A Dynamic Framework for DDOS Attack Detection and Mitigation in Software Defined Network Using Machine Learning

AM Mankawade, PD Kolpe, AM Pote… - 2024 International …, 2024 - ieeexplore.ieee.org
… The proactive defense mechanisms employed in our methodology are rate limiting and
port blocking. These mechanisms are crucial for mitigating the impact of potential Distributed

Addressing security issues in geographically distributed systems

C Hannon, JR Rinewalt - Proceedings of the Fourth Mexican …, 2003 - ieeexplore.ieee.org
… geographically distributed processing environments can safely overcome the port blocking
… We saw about a 20% improvement from the public method to the pre-session method which …

Unexpected means of protocol inference

J Ma, K Levchenko, C Kreibich, S Savage… - Proceedings of the 6th …, 2006 - dl.acm.org
… firewall port blocking, tunneling, dynamic port allocation, and a bloom of new distributed
again showing that (1) our methodology can identify flows from one unknown application as …

Blocking MSN: A case study of preventing the abuse of IM

Z Hu, Z Liu, P Su, D Feng - 2005 Asia-Pacific Conference on …, 2005 - ieeexplore.ieee.org
… course of action is to establish, distribute and enforce written security policies concerning the
… that a port blocking firewall can’t work well in blocking MSN. Another imaginable method is …

3 Proposed Detection Methodology

W Desalegn, J Shaikh, B Taye - 2024 - ieeexplore.ieee.org
… of distributed denial of service (DDoS) attacks on the control plane. The methodology hinges
on … , coupled with swift port blocking mechanisms, the methodology stands as a formidable …