Content deleted Content added
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5) (Whoop whoop pull up - 16638 |
|||
(15 intermediate revisions by 13 users not shown) | |||
Line 1:
'''Robust random early detection''' ('''RRED''') is a queueing discipline for a [[network scheduler]]. The existing [[random early detection]] (RED) algorithm and its variants are found vulnerable to emerging attacks, especially the [[Denial-of-service attack#Low-rate Denial-of-Service attacks|Low-rate Denial-of-Service attack]]s (LDoS). Experiments have confirmed that the existing RED-like algorithms are notably vulnerable under LDoS attacks due to the oscillating TCP queue size caused by the attacks.<ref name=RRED>{{
==The
A detection and filter block is added in front of a regular RED block on a router. The basic idea behind the RRED is to detect and filter out LDoS attack packets from incoming
Within a benign TCP flow, the sender will delay sending new packets if loss is detected (e.g., a packet is dropped). Consequently, a packet is suspected to be an attacking packet if it is sent within a short-range after a packet is dropped. This is the basic idea of the detection algorithm of Robust RED (RRED).<ref name="RRED"/>
==
'''algorithm''' RRED-ENQUE(pkt)
01 f ← RRED-
▲02 Tmax←MAX(Flow[f].T1, T2)
▲03 if pkt.arrivaltime is within [Tmax, Tmax+T*] then
05 '''else'''
▲04 reduce local indicator by 1 for each bin corresponding to f
▲06 increase local indicator by 1 for each bin of f
▲07 Flow[f].I←maximum of local indicators from bins of f
▲08 if Flow[f].I >=0 then
▲09 RED-ENQUE(pkt) //pass pkt to the RED block
11 T2 ← pkt.arrivaltime
▲10 if RED drops pkt then
12 '''else'''
▲13 Flow[f].T1←pkt.arrivaltime
▲14 drop(pkt)
▲15 return
*''f.T1'' is the arrival time of the last packet from flow ''f'' that is dropped by the detection and filter block.
*''T2'' is the arrival time of the last packet from any flow that is dropped by the [[random early detection]] (RED) block.
*''Tmax = max(f.T1, T2)''.
*''T*'' is a short time period, which is empirically
==The
The simulation code of the RRED algorithm is published as an [[active queue management]] and [[denial-of-service attack]] (AQM&DoS) simulation platform. The [http://sites.google.com/site/cwzhangres/home/posts/aqmdossimulationplatform AQM&DoS Simulation Platform] is able to simulate a variety of DoS attacks (Distributed DoS, Spoofing DoS, Low-rate DoS, etc.) and active queue management (AQM) algorithms ([[random early detection|RED]], RRED, SFB, etc.). It automatically
==References==
{{reflist}}
Line 40 ⟶ 39:
*[http://sites.google.com/site/cwzhangres/home/posts/aqmdossimulationplatform AQM&DoS Simulation Platform]
*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinlow-ratedosattacks Recent Publications in Low-rate Denial-of-Service (LDoS) attacks ]
*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinrandomearlydetectionredschemes Recent Publications in Random Early Detection (RED) schemes] {{Webarchive|url=https://web.archive.org/web/20160917055738/http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinrandomearlydetectionredschemes |date=2016-09-17 }}
*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinactivequeuemanagementaqmschemes Recent Publications in Active Queue Management (AQM) schemes]
|