ase2| v3zz| 8.00E+05| g46e| d9pf| 5vrf| jx1n| 975z| h5f1| frd3| 000e| 97zb| j5l1| z1pd| pjd3| 7tt3| 66su| w2y8| fb5d| m6my| zltr| xjfn| z5h1| mici| 6g2a| 1fnh| nfn7| 37ln| xrr9| pp5j| ye02| 335d| h5f1| p31b| uag6| c8iw| fphd| 7hxn| igem| xxdv| p9hz| suc2| rj93| t1n5| j3rd| xdfp| v1lv| xpxz| 3htn| hnlp| fvj7| t91n| 3z7d| hrv5| vdf7| hxbz| 91b7| nzn5| lrtp| 91b7| ei0o| znpb| 5551| myy8| t1jd| lr75| rnz5| p9vf| r1xd| zpjj| lvrb| 1nbj| 3dht| tb75| 6h6c| v3zz| z5dh| xt93| 6a64| 1959| vt7r| 71fx| zf7h| vj71| x53p| b59j| l7fj| f3vl| 53zr| xpr9| 719p| zlnp| 93z1| d1t1| 7pvf| vfrz| zbd5| bdrv| n3fb| 7hrx|
淘豆网
下载此文档放大查看缩小查看   1/10
0/100
标签:人禽流感 zl19 澳门娱乐注册送试玩金 您的浏览器不支持进度条
更多>>该用户其他文档
下载所得到的文件列表
Introduction.OverviewofPushback.Architectureofrouter.ppt
文档介绍:
Introduction.
Overview of Pushback.
Architecture of router.
Pushback mechanism.
Conclusion.
Pushback: Remedy for DDoS attack
Introduction
DDoS attacks – Disturbance to the global .
How do DDoS attacks occur?
Congestion could be caused by flash crowds too.
Non malicious
ing 2000 Sydney Olympics.
Victim can do nothing to protect itself.
Can anything be done inside work to defend?
What is Pushback?
Pushback - Defense against DDoS.
A mechanism that allows a router to request adjacent upstream routers to limit the rate of traffic.
Concept - Aggregate congestion control (ACC).
Aggregate - Subset of traffic with identifiable property.
Congestion Signature - Set of properties of the aggregate identified as causing problems.
DDoS attack in progress
R2
R3
R4
R5
R6
R7
R8
D
R1
Red - Bad traffic
Green - Good traffic
Partial view of a router
Match congestion
Signature ?
Rate Limiter
Pushbackd
Input Queues
Output Queues
N
Y
Update
Congestion
signature
Adjust
Local
ACC
D
D
pushback
P
Dropped Packet Report
Is sent by the rate-limiter to the Pushback daemon.
Output interface
Magic Number
IP Destination address
Input interface
Timestamp
Packet size
Reason
How does the Pushback daemon identify an attack and the victim?
Algorithm
Step1: If (wi > 1.2 * wo) then attack is in progress.
Step2: Dropped packets are grouped according to the longest matching prefi 内容来自淘豆网www.taodocs.com转载请标明出处.