Controlling malicious sources at Internet gateways | IEEE Conference Publication | IEEE Xplore