Content deleted Content added
No edit summary |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5) (Whoop whoop pull up - 16638 |
||
(26 intermediate revisions by 18 users not shown) | |||
Line 1:
'''Robust random early detection''' ('''RRED''') is a queueing discipline for a [[network scheduler]]. The existing [[
==The Design of Robust RED (RRED)==▼
A detection and filter block is added in front of a regular RED block on a router. The basic idea behind the RRED is to detect and filter out LDoS attack packets from incoming flows before they feed to the RED algorithm. How to distinguish an attacking packet from normal TCP packets is critical in the RRED design.
Within a benign TCP flow, the sender will delay sending new packets if loss is detected (e.g., a packet is dropped). Consequently, a packet is suspected to be an attacking packet if it is sent within a short-range after a packet is dropped. This is the basic idea of the detection algorithm of Robust RED (RRED).<ref name="RRED"/>
'''algorithm''' RRED-ENQUE(pkt)▼
05 '''else'''
11 T2 ← pkt.arrivaltime
12 '''else'''
*''f.T1'' is the arrival time of the last packet from flow ''f'' that is dropped by the detection and filter block.▼
▲==The Algorithm of the Robust RED (RRED)==
*''T2'' is the arrival time of the last packet from any flow that is dropped by the [[
*''Tmax = max(f.T1, T2)''.▼
▲''f.T1'' is the arrival time of the last packet from flow ''f'' that is dropped by the detection and filter block.
*''T*'' is a short time period, which is empirically
▲''T2'' is the arrival time of the last packet from any flow that is dropped by the [[Random Early Detection]] block.
▲''Tmax = max(f.T1, T2)''.
▲''T*'' is a short time period, which is empirically choose to be 10ms in a default [[RRED]] algorithm.
▲RRED-ENQUE(pkt)
▲01 f←RRED-FLOWHASH(pkt)
▲02 Tmax←MAX(Flow[f].T1, T2)
▲03 if pkt.arrivaltime is within [Tmax, Tmax+T*] then
▲04 reduce local indicator by 1 for each bin corresponding to f
▲06 increase local indicator by 1 for each bin of f
▲07 Flow[f].I←maximum of local indicators from bins of f
▲08 if Flow[f].I >=0 then
▲09 RED-ENQUE(pkt) //pass pkt to the RED block
▲10 if RED drops pkt then
▲13 Flow[f].T1←pkt.arrivaltime
▲14 drop(pkt)
▲15 return
==The Simulation code of the Robust RED (RRED)==▼
The simulation code of the RRED algorithm is published as an Active Queue Managment and Denial-of-Service ([[AQM&DoS]]) Simulation Platform. The [[AQM&DoS Simulation Platform]] is able to simulate a variety of DoS attacks (Distributed DoS, Spoofing DoS, Low-rate DoS, etc.) and Active Queue Management (AQM) algorithms (RED, [[RRED]], SFB, etc.). It automatically calculate and record the average throughput of normal TCP flows before and after [[DDoS]] attacks to facilitate the analysis of the impact of DoS attacks on normal TCP flows and AQM algorithms.[http://sites.google.com/site/cwzhangres/home/posts/aqmdossimulationplatform More Details]▼
[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinlow-ratedosattacks Recent Publications in Low-rate Denial-of-Service (LDoS) attacks ]▼
[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinrandomearlydetectionredschemes Recent Publications in Random Early Detection (RED) schemes]▼
▲The simulation code of the RRED algorithm is published as an
==References==
{{reflist}}
==External links==
*[http://sites.google.com/site/cwzhangres/home/posts/aqmdossimulationplatform AQM&DoS Simulation Platform]
▲*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinlow-ratedosattacks Recent Publications in Low-rate Denial-of-Service (LDoS) attacks ]
*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinrandomearlydetectionredschemes Recent Publications in Random Early Detection (RED) schemes] {{Webarchive|url=https://web.archive.org/web/20160917055738/http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinrandomearlydetectionredschemes |date=2016-09-17 }}
▲*[http://sites.google.com/site/cwzhangres/home/posts/
{{DEFAULTSORT:Random Early Detection}}
[[Category:Network performance]]
[[Category:Packets (information technology)]]
[[Category:Denial-of-service attacks]]
[[Category:Computer network security]]
|