A New Scheme for IP-based Internet-Mobility
LCN '03 Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks
On the Performance of Reliable Server Pooling Systems
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Denial of service via algorithmic complexity attacks
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
An Evalulation of the Pool Maintenance Overhead in Reliable Server Pooling Systems
FGCN '07 Proceedings of the Future Generation Communication and Networking - Volume 01
A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments
ICDS '08 Proceedings of the Second International Conference on Digital Society
Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive Services
ICDS '08 Proceedings of the Second International Conference on Digital Society
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Evaluation of architectures for reliable server pooling in wired and wireless environments
IEEE Journal on Selected Areas in Communications
SimProcTC: the design and realization of a powerful tool-chain for OMNeT++ simulations
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
On the security of reliable server pooling systems
International Journal of Intelligent Information and Database Systems
Hi-index | 0.00 |
The Reliable Server Pooling (RSerPool) architecture is the IETF's novel approach to standardize a light-weight protocol framework for server redundancy and session failover. It combines ideas from different research areas into a single, resource-efficient and unified architecture. While there have already been a number of contributions on the performance of RSerPool for its main tasks - pool management, load distribution and failover handling - the robustness of the protocol framework has not yet been evaluated against intentional attacks. The first goal of this paper is to provide a robustness analysis. In particular, we would like to outline the attack bandwidth necessary for a significant impact on the service. Furthermore, we present and evaluate our countermeasure approach to significantly reduce the impact of attacks.