Content deleted Content added
→The Simulation code of the Robust RED (RRED): Third person requires s at the end of verb in present simple |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5) (Whoop whoop pull up - 16638 |
||
(9 intermediate revisions by 7 users not shown) | |||
Line 1:
'''Robust random early detection''' ('''RRED''') is a queueing
The Robust RED (RRED) algorithm was proposed to improve the TCP throughput against LDoS attacks. The basic idea behind the RRED is to detect and filter out attack packets before a normal RED algorithm is applied to incoming flows. RRED algorithm can significantly improve the performance of TCP under Low-rate denial-of-service attacks.<ref name="RRED"/>
==The
A detection and filter block is added in front of a regular RED block on a router. The basic idea behind the RRED is to detect and filter out LDoS attack packets from incoming flows before they feed to the RED algorithm. How to distinguish an attacking packet from normal TCP packets is critical in the RRED design.
Line 9:
==Algorithm of the Robust RED (RRED)==
'''algorithm''' RRED-ENQUE(pkt)
01 f ← RRED-
▲02 Tmax←MAX(Flow[f].T1, T2)
▲03 if pkt.arrivaltime is within [Tmax, Tmax+T*] then
05 '''else'''
▲04 reduce local indicator by 1 for each bin corresponding to f
▲06 increase local indicator by 1 for each bin of f
▲07 Flow[f].I←maximum of local indicators from bins of f
▲08 if Flow[f].I >=0 then
▲09 RED-ENQUE(pkt) //pass pkt to the RED block
11 T2 ← pkt.arrivaltime
▲10 if RED drops pkt then
12 '''else'''
▲13 Flow[f].T1←pkt.arrivaltime
▲14 drop(pkt)
▲15 return
*''f.T1'' is the arrival time of the last packet from flow ''f'' that is dropped by the detection and filter block.
*''T2'' is the arrival time of the last packet from any flow that is dropped by the [[random early detection]] (RED) block.
*''Tmax = max(f.T1, T2)''.
*''T*'' is a short time period, which is empirically
==The
The simulation code of the RRED algorithm is published as an [[active queue management]] and [[denial-of-service attack]] (AQM&DoS) simulation platform. The [http://sites.google.com/site/cwzhangres/home/posts/aqmdossimulationplatform AQM&DoS Simulation Platform] is able to simulate a variety of DoS attacks (Distributed DoS, Spoofing DoS, Low-rate DoS, etc.) and active queue management (AQM) algorithms ([[random early detection|RED]], RRED, SFB, etc.). It automatically calculates and records the average throughput of normal TCP flows before and after DoS attacks to facilitate the analysis of the impact of DoS attacks on normal TCP flows and AQM algorithms.
==References==
Line 40 ⟶ 39:
*[http://sites.google.com/site/cwzhangres/home/posts/aqmdossimulationplatform AQM&DoS Simulation Platform]
*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinlow-ratedosattacks Recent Publications in Low-rate Denial-of-Service (LDoS) attacks ]
*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinrandomearlydetectionredschemes Recent Publications in Random Early Detection (RED) schemes] {{Webarchive|url=https://web.archive.org/web/20160917055738/http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinrandomearlydetectionredschemes |date=2016-09-17 }}
*[http://sites.google.com/site/cwzhangres/home/posts/recentpublicationsinactivequeuemanagementaqmschemes Recent Publications in Active Queue Management (AQM) schemes]
|