The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the schemes that mitigate DRDoS attack only provide mechanism for filtering the attack traffic. They do not provide any tool for tracing back to the attacker. The few schemes that perform IP traceback requires involvement of the reflectors which is quite difficult to obtain. They require reflectors to store huge amount of traffic logs and cooperate during the attack. Reverse iTrace is one...
Load balancing traffic of a multihomed stub network among its various egress links can significantly improve performance by allowing the network to route its traffic around congested paths. In, several centralized route control schemes to load balance traffic were proposed. It was shown that employing these route control schemes resulted in significant improvement in round-trip times. We carry this...
In the Internet, with many competing networks each trying to optimise its own bandwidth, a stub network has limited knowledge about user demands, available network resources and routing policies of other networks. This uncertainty makes the task of interdomain traffic engineering for a stub network very challenging. The basic aim of a stub network connected to multiple ISPs (multihomed) is to load...
In order to bridge the speed disparity at the LAN-WAN interface, enterprises install a number of policy-based devices to enforce administrative policies over the WAN access. The conventional techniques of bandwidth management concentrate only on the outgoing traffic from the local network, since that is the only traffic that can be controlled. However it is usually the incoming traffic that causes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.