About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
ICC 2003
Conference paper
Controlling malicious sources at internet gateways
Abstract
An algorithm known as XCHOKe is presented to control flows from malicious sources (MS). The per-packet computation is small with no floating-point operations. The attempt is to prevent a sustained attack of non-adaptive flows at Internet Gateways at the cost of denying the adaptive flows their fair share of bandwidth.