Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
The Effects of Inter-Packet Spacing on the Delivery of Multimedia Content
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Network border patrol: preventing congestion collapse and promoting fairness in the internet
IEEE/ACM Transactions on Networking (TON)
A new algorithm to promote fairness and congestion control in the internet
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Low-rate TCP-targeted denial of service attacks and counter strategies
IEEE/ACM Transactions on Networking (TON)
Adaptive Head-to-Tail: Active Queue Management based on implicit congestion signals
Computer Communications
A rate-based drop policy for punishing unresponsive flows
Computer Communications
Congestion control in TCP/IP networks: a combined ECN and BECN approach
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Hi-index | 0.00 |
In this paper, we propose router mechanisms to regulate unresponsive best-effort traffic. By unresponsive traffic we mean flows that do not reduce their sending rate in response to congestion. The goal of the proposed mechanisms is to drop undeliverable packets as close to the periphery of the network as possible. The key ideas of our approach are: (1) edge routers keep track of incoming flows and their arrival rates; (2) core routers use RED for queue management and generate rate-limited source quenches on packet drops to advice sources to reduce their sending rates; and (3) edge routers snoop on source quenches passing through them and use them to control per-flow regulators. Regulators adjust their maximum sending rate using a multiplicative-decrease, additive-increase discipline. A decrease is triggered by the arrival of a source quench; an increase is triggered by non-arrival of source quenches for a time period. We examine the impact of these mechanisms for a variety of simulated network topologies and traffic patterns.