Publication
ICC 2003
Conference paper

Controlling malicious sources at internet gateways

Abstract

An algorithm known as XCHOKe is presented to control flows from malicious sources (MS). The per-packet computation is small with no floating-point operations. The attempt is to prevent a sustained attack of non-adaptive flows at Internet Gateways at the cost of denying the adaptive flows their fair share of bandwidth.

Date

Publication

ICC 2003

Authors

Share