Provided by: International Journal of Engineering Trends and Technology
Date Added: Aug 2013
To prevent network infrastructure from malicious traffic, such as DDoS attack and scanning, source filtering is widely used in the network. There are different ways to store the filters, e.g., a blacklist of source addresses. Among them, TCAM-based is used as the de facto, because of its wire speed performance. Unfortunately, TCAM is a scarce resource because it's limited by small capacity, high power consumption and high cost. There are chances like a data distributor had given his sensitive data to a set of trusted agents. These agents can be called as third parties.