Professional Documents
Culture Documents
smc00 Edited
smc00 Edited
net/publication/3876432
CITATIONS READS
298 7,301
4 authors, including:
Ljiljana Trajkovic
Simon Fraser University
201 PUBLICATIONS 2,962 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ljiljana Trajkovic on 25 December 2014.
In simulation scenarios using the remaining queuing Finally, two variants of the Class Based Queuing algorithms
algorithms, topologies A and B did not provide enough were successful in providing full bandwidth requested by
traffic overload to prevent legitimate users from receiving the legitimate user. In fact, with appropriately defined flow
requested bandwidth. However, simulations based on classes (with known and unknown flags), the legitimate user
topology C resulted in several target routers being was able to obtain all requested bandwidth, as shown in
overloaded during the attack by the twelve attack daemons. Figure 6 (bottom).
For the simulation scenario with topology C, we allocated Unlike other queuing algorithms that we simulated, Class
0.1 Mbps to the legitimate user, 0.5 Mbps bandwidth was Based Queuing algorithms require extra overhead and effort
given to attackers 1-6, and 1.0 Mbps was given to attackers to be implemented, because input flows to a Class Based
7-12. The total input bandwidth of the attackers is 9.0 Queuing based routers must be a priori categorized and
Mbps. managed. Hence, this queuing discipline may not be a
Two queuing algorithms (Random Early Detection and Class feasible solution for routers with a large number of input
Based Queuing) are successful in providing bandwidth links.
requested by the legitimate user during the simulations
using network topology C. Fair Queuing, Stochastic Fair
Queuing, and Deficit Round Robin Queuing are algorithms
that provided little or no bandwidth to the legitimate user
during the attack. Although the user did not receive full
throughput with Random Early Detection queuing, he/she
continued to receive service through most of the duration of
the attack scenario, as shown in Figure 5 (bottom).