请输入您要查询的百科知识:

 

词条 Robust random early detection
释义

  1. The Design of Robust RED (RRED)

  2. Algorithm of the Robust RED (RRED)

  3. The Simulation code of the Robust RED (RRED)

  4. References

  5. External links

Robust random early detection (RRED) is a queueing disclipine for a network scheduler. The existing random early detection (RED) algorithm and its variants are found vulnerable to emerging attacks, especially the Low-rate Denial-of-Service attacks (LDoS). Experiments have confirmed that the existing RED-like algorithms are notably vulnerable under LDoS attacks due to the oscillating TCP queue size caused by the attacks.[1]

The Robust RED (RRED) algorithm was proposed to improve the TCP throughput against LDoS attacks. The basic idea behind the RRED is to detect and filter out attack packets before a normal RED algorithm is applied to incoming flows. RRED algorithm can significantly improve the performance of TCP under Low-rate denial-of-service attacks.[1]

The Design of Robust RED (RRED)

A detection and filter block is added in front of a regular RED block on a router. The basic idea behind the RRED is to detect and filter out LDoS attack packets from incoming flows before they feed to the RED algorithm. How to distinguish an attacking packet from normal TCP packets is critical in the RRED design.

Within a benign TCP flow, the sender will delay sending new packets if loss is detected (e.g., a packet is dropped). Consequently, a packet is suspected to be an attacking packet if it is sent within a short-range after a packet is dropped. This is the basic idea of the detection algorithm of Robust RED (RRED).[1]

Algorithm of the Robust RED (RRED)

  • f.T1 is the arrival time of the last packet from flow f that is dropped by the detection and filter block.
  • T2 is the arrival time of the last packet from any flow that is dropped by the random early detection (RED) block.
  • Tmax = max(f.T1, T2).
  • T is a short time period, which is empirically chosen to be 10 ms in a default RRED algorithm.[1]

The Simulation code of the Robust RED (RRED)

The simulation code of the RRED algorithm is published as an active queue management and denial-of-service attack (AQM&DoS) simulation platform. The AQM&DoS Simulation Platform is able to simulate a variety of DoS attacks (Distributed DoS, Spoofing DoS, Low-rate DoS, etc.) and active queue management (AQM) algorithms (RED, RRED, SFB, etc.). It automatically calculates and records the average throughput of normal TCP flows before and after DoS attacks to facilitate the analysis of the impact of DoS attacks on normal TCP flows and AQM algorithms.

References

1. ^{{Cite journal | last1 = Zhang | first1 = C. | last2 = Yin | first2 = J. | last3 = Cai | first3 = Z. | last4 = Chen | first4 = W. | title = RRED: Robust RED algorithm to counter low-rate denial-of-service attacks | doi = 10.1109/LCOMM.2010.05.091407 | journal = IEEE Communications Letters | volume = 14 | issue = 5 | pages = 489–491 | date=May 2010 | pmid = | pmc = | url = https://sites.google.com/site/cwzhangres/home/files/RREDRobustREDAlgorithmtoCounterLow-rateDenial-of-ServiceAttacks.pdf?attredirects=0}}

External links

  • AQM&DoS Simulation Platform
  • Recent Publications in Low-rate Denial-of-Service (LDoS) attacks
  • Recent Publications in Random Early Detection (RED) schemes
  • Recent Publications in Active Queue Management (AQM) schemes
{{DEFAULTSORT:Random Early Detection}}

4 : Network performance|Packets (information technology)|Denial-of-service attacks|Computer network security

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/13 16:13:22