2011
DOI: 10.21236/ada580050
|View full text |Cite
|
Sign up to set email alerts
|

FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…We configure S5 and S6 to send 10 Mbps traffic and observe how the under-subscribed bandwidth by those ASes is reallocated to other ASes. The congested router (i.e., P3) performs per-path fair bandwidth control using a token bucket mechanism [20], where individual paths are assigned separate token buckets. The remaining routers operate drop-tail queues to model the legacy part of the Internet.…”
Section: Persistent Tcp Flowsmentioning
confidence: 99%
“…We configure S5 and S6 to send 10 Mbps traffic and observe how the under-subscribed bandwidth by those ASes is reallocated to other ASes. The congested router (i.e., P3) performs per-path fair bandwidth control using a token bucket mechanism [20], where individual paths are assigned separate token buckets. The remaining routers operate drop-tail queues to model the legacy part of the Internet.…”
Section: Persistent Tcp Flowsmentioning
confidence: 99%