摘要:
The method is based on marking packets with the partial address information of ingress interface only. The attack victim is able to recover the complete address(es) information after receiving several packets from a particular attacking host or hosts. The full path is not really essential for the traceback since it can be different for different packets for different reasons. In order to make tracing slaves from reflectors possible, the potential reflectors keep the log of two fields of every packet, which they receive. The two fields are source address for the mark. The entry is kept in the log for a reasonable period of time in order for the victim to be able to use that information. By analyzing the marks from the logs, which cannot be spoofed, and that are sure to be from the slaves, the victim can reconstruct the ingress addresses of the slaves which sent the packets to the reflectors.
摘要:
A method for allocating a fair bit rate for an ABR service. Forward and backward RM cells traversing a link 1 are received at an ATM switch. Both the forward and backward RM cells are associated with a session, with the forward RM cells being transmitted from a source to a destination and the backward RM cells being transmitted from the destination to the source. An advertised rate .gamma..sub.l for link 1 is updated when a backward RM cell associated the session is received based on a change in a bottleneck bandwidth .DELTA..lambda. of the session and a change in a bottleneck status .DELTA..beta. of the session. The explicit rate .lambda..sup.ER contained in the backward RM cell is rewritten as a minimum of the advertised rate .gamma..sub.l and the explicit rate .lambda..sup.ER. The backward RM cell is then transmitted to the source of the RM cell.