摘要:
A method and system for detecting routing loops and time-to-live (TTL) expiry attacks in a telecommunications network are disclosed. The detection of routing loops and TTL expiry attacks can be achieved based on the comparison of TTL expiries occurring on two or more routers in the network. A quantity of TTL expiries associated with a router can be summed. Additionally, a quantity of TTL expiries associated with other routers that are operatively coupled to the router can be summed. A difference between the sums can be calculated and a determination of whether a routing loop exists can be made in response to the difference.
摘要:
Group-wise testing of the clocks arriving at a switching office is undertaken by multiplexing the clocks onto a single line and developing a signal therefrom that is indicative of a problem, if it exists, in any of the component signals that were multiplexed. In one embodiment, the developed signal is a gated portion of the multiplexed signal. That signal is integrated over an integration frame and compared to the integrated signal of another integration frame. A difference between the two compared signals indicates that at least one of the clocks is out of frequency synch. Subsequent tests identify the offending clock, or clocks.
摘要:
A system and method for aiding the handling of DDoS attacks in which VPN traffic entering an ISP network at some points will be black-holed, while VPN traffic entering the ISP network at other points will be routed, as it should be, to the system-under-attack. Thus, the system-under-attack is made available to some of the user community and made unavailable to suspect portions of the user community. Furthermore, the number of entry points where black-holing of VPN traffic occurs can be selected and changed in real-time during a DDoS attack.
摘要:
In an IP network during a DDoS attack on a website or other internet entity having an IP address, selective black-holing of attack traffic is performed such that some of the traffic destined for the IP address under attack continues to go to the IP address under attack while other traffic, destined for the same IP address is, rerouted via BGP sessions to a black-hole router. Such a selective black-holing scheme can be used to allow some traffic to continue in route to the IP address under attack, while other traffic is diverted.
摘要:
A system and method for aiding the handling of DDoS attacks in which VPN traffic entering an ISP network at some points will be black-holed, while VPN traffic entering the ISP network at other points will be routed, as it should be, to the system-under-attack. Thus, the system-under-attack is made available to some of the user community and made unavailable to suspect portions of the user community. Furthermore, the number of entry points where black-holing of VPN traffic occurs can be selected and changed in real-time during a DDoS attack.
摘要:
By recognizing that it is not necessary to identify a synchronization failure immediately when the failure occurs, but rather not until the failure results in a detectable difference, the method and system described herein can distinguish between Cell Delay Variation (CDV) and loss of synchronization. Because CDV will have a larger effect on the stability than a failure of the frequency recovery system at the precise moment of the failure, a synchronization failure cannot usually be distinguished from CDV for several minutes or hours, depending upon the stability of the reference clock. The present invention monitors a fill level of a play-out buffer in the ATM network, and attempts to determine if a variation in the fill level is linear with time, which is indicative of a synchronization failure. Upon detecting such a failure, the method of the present invention switches to an adaptive method for frequency recovery. If the variation in the fill level of the play-out buffer is not linear, but an underflow/overflow (or slip) has occurred, then the method of the present invention can inform an intelligent buffer control that the underflow/overflow is not due to the presence of a synchronization failure, which enables the intelligent buffer controller to take appropriate action.