Unwanted Traffic: Denial of Service Attacks

Size: px
Start display at page:

Download "Unwanted Traffic: Denial of Service Attacks"

Transcription

1 CS 155 Uwated Traffic: Deial of Service Attacks Da Boeh 1

2 What is etwork DoS? Goal: take out a large site with little computig work How: Amplificatio Small umber of packets big effect Two types of amplificatio attacks: DoS bug: w Desig flaw allowig oe machie to disrupt a service DoS flood: w Commad bot-et to geerate flood of requests 2

3 DoS ca happe at ay layer This lecture: Sample Dos at differet layers (by order): w Lik w TCP/UDP w Applicatio DoS mitigatios Sad truth: Curret Iteret ot desiged to hadle DDoS attacks 3

4 Warm up: b DoS bugs Radio jammig attacks: Protocol DoS bugs: trivial, ot our focus. [Bellardo, Savage, 03] NAV (Network Allocatio Vector): w 15-bit field. Max value: w Ay ode ca reserve chael for NAV secods w No oe else should trasmit durig NAV period but ot followed by most b cards De-autheticatio bug: w Ay ode ca sed deauth packet to AP w Deauth packet uautheticated attacker ca repeatedly deauth ayoe 4

5 Smurf amplificatio DoS attack 1 ICMP Echo Req Src: Dos Target Dest: brdct addr 3 ICMP Echo Reply Dest: Dos Target DoS Source gateway DoS Target Sed pig request to broadcast addr (ICMP Echo Req) Lots of resposes: Every host o target etwork geerates a pig reply (ICMP Echo Reply) to victim Prevetio: reject exteral packets to broadcast address 5

6 Moder day example (Feb 18) memcached amplificatio attack: ( 51K amplificatio ) memcached query SrcIP: Dos Target respose DoS Source (15 bytes UDP) request for a large file memcached server (750 KB) DoS Target 2018: 87,000 exposed memcached servers Feb. 2018: 1.35 Tbps attack o GitHub Simple solutio: disable Memcached over UDP (o attack over TCP) 6

7 Moder day example Same attack usig other protocols: DNS, NTP, (over UDP) DNS amplificatio: short DNS query, large respose 2006: 0.58M ope resolvers o Iteret (Kamisky-Shiffma) 2017: 15M ope resolvers (operesolverproject.org) 3/2013: DDoS attack geeratig 309 Gbps for 28 mis. 31,000 ope DNS resolvers, each outputtig 10Mbps. Source: 3 etworks that allowed source IP spoofig. NTP amplificatio: 2014: 400 Gbps (4500 NTP servers) 7

8 Scale, Targetig ad Frequecy of Attacks 100 Gbps Badwidth (Gbps) Figure 13 Source: Arbor Networks, Ic. Feb. 2014: 400 Gbps via NTP amplificatio (4500 NTP servers) 8

9 Review: IP Header format Coectioless Ureliable Best effort 0 31 Versio Flags Header Legth Type of Service Total Legth Idetificatio Fragmet Offset Time to Live Protocol Header Checksum Source Address of Origiatig Host Destiatio Address of Target Host Optios Paddig IP Data 9

10 Review: TCP Header format TCP: Sessio based Cogestio cotrol I order delivery 0 31 Source Port Dest port SEQ Number ACK Number U A P P S F R C SH S YN IN G K R Other stuff 10

11 Review: TCP Hadshake C S SYN: SN C rad C AN C 0 Listeig SYN/ACK: SN S rad S AN S SN C Store SN C, SN S ACK: SN SN C AN SN S Wait Established 11

12 TCP SYN Flood I: low rate (DoS bug) C SYN C1 SYN C2 SYN C3 SYN C4 SYN C5 S Sigle machie: SYN Packets with radom source IP addresses Fills up backlog queue o server No further coectios possible 12

13 SYN Floods (phrack 48, o 13, 1996) OS Backlog queue size Liux 1.2.x 10 FreeBSD WiNT Backlog timeout: 3 miutes Attacker eeds oly 128 SYN packets every 3 miutes Low rate SYN flood 13

14 Low rate SYN flood defeses The problem: server commits resources (memory) before cliet respods No-solutio: Icrease backlog queue size or decrease timeout Correct solutio (whe uder attack) : Sycookies: remove state from server Small performace overhead 15

15 Sycookies [Berstei, Schek] Idea: use secret key ad data i packet to ge. server SN Server respods to Cliet with SYN-ACK cookie: T = 5-bit couter icremeted every 64 secs. L = MAC key (SAddr, SPort, DAddr, DPort, SN C, T) [24 bits] w key: picked at radom durig boot SN S = (T. mss. L) ( L = 24 bits ) Server does ot save state (other TCP optios are lost) Hoest cliet respods with ACK (AN=SN S, SN=SN C +1) Server allocates space for socket oly if valid SN S 16

16 SYN floods: backscatter [MVS 01] SYN with forged source IP Þ SYN/ACK to radom host 17

17 Backscatter measuremet Liste to uused IP addresss space (darket) /8 etwork 0 moitor 2 32 Loely SYN/ACK packet likely to be result of SYN attack 2001: 400 SYN attacks/week 2013: 773 SYN attacks/24 hours (arbor etworks ATLAS) Larger experimets: (moitor may ISP darkets) w Arbor etworks 18

18 Estoia attack (ATLAS 07) Attack types detected: 115 ICMP floods, 4 TCP SYN floods Badwidth: 12 attacks: Mbps for over 10 hours All attack traffic was comig from outside Estoia Estoia s solutio: w Estoia ISPs blocked all foreig traffic util attacks stopped DoS attack had little impact iside Estoia 19

19 Massive floods (e.g. Mirai 9/2016 o Krebs) Commad bot army to flood specific target: (DDoS) Flood with SYN, ACK, UDP, ad GRE packets 623 Gbps (peak) from 100K compromised IoT devices At web site: Saturates etwork uplik or etwork router Radom source IP attack SYNs look the same as real SYNs What to do??? 20

20 src: icapsula.com 21

21 Google project shield Protectig ews orgaizatios. (Commercial service: Akamai, Cloudlare, ) Idea: oly forward established TCP coectios to site Lots-of-SYNs Lots-of-SYN/ACKs Few ACKs Project Shield Proxy Forward to site Web site 22

22 Stroger attacks: GET flood Commad bot army to: Complete TCP coectio to web site Sed short HTTP GET request Repeat Will bypass SYN flood protectio proxy but: Attacker ca o loger use radom source IPs. w Reveals locatio of bot zombies Proxy ca ow block or rate-limit bots. 24

23 A real-world example: GitHub (3/2015) Javascript-based DDoS: popular server github.com hoest ed user iject imageflood.js imageflood.js fuctio imgflood() { var TARGET = 'victim-website.com/idex.php? var rad = Math.floor(Math.radom() * 1000) var pic = ew Image() pic.src = ' } setiterval(imgflood, 10) Would HTTPS prevet this DDoS? 25

24 DNS DoS Attacks (e.g. Dy attack 10/2016) DNS rus o UDP port 53 DNS etry for victim.com hosted at DNSProvider.com DDoS attack: flood DNSProvider.com with DNS queries Radom source IP address i UDP packets Takes out etire DNS server (collateral damage) Dy attack: used some Mirai-based bots At least 100,000 malicious ed poits Dy caot aswer may legit DNS queries Disrupted service at Netflix, Github, Twitter, 26

25 DoS via route hijackig YouTube is /22 (icludes 2 10 IP addr) youtube.com is , Feb. 2008: Pakista telecom advertised a BGP path for /24 (icludes 2 8 IP addr) Routig decisios use most specific prefix The etire Iteret ow thiks is i Pakista Outage resolved withi two hours but demostrates huge DoS vul. with o solutio! 27

26 DoS Mitigatio 29

27 1. Igress filterig (RFC 2827, 3704) Big problem: DDoS with spoofed source IPs ISP Iteret Igress filterig policy: ISP oly forwards packets with legitimate source IP (see also SAVE protocol) 30

28 Implemetatio problems ALL ISPs must do this. Requires global trust. If 10% of ISPs do ot implemet o defese No icetive for deploymet 2017: 33% of Auto. Systems are fully spoofable (spoofer.caida.org) 23% of aouced IP address space is spoofable Recall: 309 Gbps attack used oly 3 etworks (3/2013)

29 2. Cliet puzzles Idea: slow dow attacker Moderately hard problem: Give challege C fid X such that LSB ( SHA-1( C X ) ) = 0 Assumptio: takes expected 2 time to solve For =16 takes about.3sec o 1GhZ machie Mai poit: checkig puzzle solutio is easy. Durig DoS attack: Everyoe must submit puzzle solutio with requests Whe o attack: do ot require puzzle solutio 32

30 Examples GET floods (RSA 99) Example challege: C = TCP server-seq-um First data packet must cotai puzzle solutio w Otherwise TCP coectio is closed SSL hadshake DoS: (SD 03) Challege C based o TLS sessio ID Server: check puzzle solutio before RSA decrypt. 33

31 Beefits ad limitatios Hardess of challege: Decided based o DoS attack volume. Limitatios: Requires chages to both cliets ad servers Hurts low power legitimate cliets durig attack: w Cliets o cell phoes ad tablets caot coect 34

32 Memory-boud fuctios CPU power ratio: high ed server / low-ed IoT device = 8000 Impossible to scale to hard puzzles Iterestig observatio: Mai memory access time ratio: w high ed server / low-ed IoT device = 2 Better puzzles: Solutio requires may mai memory accesses w Dwork-Goldberg-Naor, Crypto 03 w Abadi-Burrows-Maasse-Wobber, ACM ToIT 05 35

33 3. CAPTCHAs Idea: verify that coectio is from a huma Applies to applicatio layer DDoS Durig attack: geerate CAPTCHAs ad process request oly if valid solutio Preset oe CAPTCHA per source IP address. 36

34 4. Source idetificatio Goal: idetify packet source Ultimate goal: block attack at the source 37

35 Traceback [Savage et al. 00] Goal: Give set of attack packets Determie path to source How: chage routers to record ifo i packets Assumptios: Most routers remai ucompromised Attacker seds may packets Route from attacker to victim remais relatively stable 38

36 Simple method Write path ito etwork packet Each router adds its ow IP address to packet Victim reads path from packet Problem: Requires space i packet w Path ca be log w No extra fields i curret IP format Chages to packet format too much to expect 39

37 Better idea DDoS ivolves may packets o same path A 1 A 2 A 3 A 4 A 5 Store oe lik i each packet Each router probabilistically stores ow address Fixed space regardless of path legth R 6 R 7 R 8 R 9 R 10 R 12 V 40

38 Edge Samplig Data fields writte to packet: Edge: start ad ed IP addresses Distace: umber of hops sice edge stored Markig procedure for router R if coi turs up heads (with probability p) the write R ito start address write 0 ito distace field else if distace == 0 write R ito ed field icremet distace field 41

39 Edge Samplig: picture Packet received R 1 receives packet from source or aother router Packet cotais space for start, ed, distace packet s e d R 1 R 2 R 3 42

40 Edge Samplig: picture Begi writig edge R 1 chooses to write start of edge Sets distace to 0 packet R 1 0 R 1 R 2 R 3 43

41 Edge Samplig Fiish writig edge R 2 chooses ot to overwrite edge Distace is 0 w Write ed of edge, icremet distace to 1 packet R 1 R 2 1 R 1 R 2 R 3 44

42 Edge Samplig Icremet distace R 3 chooses ot to overwrite edge Distace >0 w Icremet distace to 2 packet R 1 R 2 2 R 1 R 2 R 3 45

43 Path recostructio Extract iformatio from attack packets Build graph rooted at victim Each (start,ed,distace) tuple provides a edge # packets eeded to recostruct path l(d) E(X) < p(1-p) d-1 where p is markig probability, d is legth of path 46

44 Problem: Reflector attacks [Paxso 01] Reflector: A etwork compoet that respods to packets Respose set to victim (spoofed source IP) Examples: DNS Resolvers: UDP 53 with victim.com source w At victim: DNS respose Web servers: TCP SYN 80 with victim.com source w At victim: TCP SYN ACK packet NTP servers 49

45 DoS Attack Sigle Master May bots to geerate flood Zillios of reflectors to hide bots Kills traceback ad pushback methods 50

46 Take home message: Deial of Service attacks are real: Must be cosidered at desig time Sad truth: Iteret is ill-equipped to hadle DDoS attacks May commercial solutios: CloudFlare, Akamai, May proposals for core redesig 60

47 THE END 61

Dan Boneh, John Mitchell, Dawn Song. Denial of Service

Dan Boneh, John Mitchell, Dawn Song. Denial of Service Dan Boneh, John Mitchell, Dawn Song Denial of Service What is network DoS? Goal: take out a large site with little computing work How: Amplification Small number of packets big effect Two types of amplification

More information

Unwanted Traffic: Denial of Service Attacks. Original slides by Dan Boneh and John Mitchell

Unwanted Traffic: Denial of Service Attacks. Original slides by Dan Boneh and John Mitchell Unwanted Traffic: Denial of Service Attacks Original slides by Dan Boneh and John Mitchell 1 What is network DoS? Goal: take out a large site with little computing work How: Amplification n Small number

More information

Unwanted Traffic: Denial of Service Attacks

Unwanted Traffic: Denial of Service Attacks CS 155 Unwanted Traffic: Denial of Service Attacks Dan Boneh Acknowledgments: Lecture slides are from the Computer Security course thought by Dan Boneh and John Mitchell at Stanford University. When slides

More information

Unwanted Traffic: Denial of Service Attacks

Unwanted Traffic: Denial of Service Attacks CS 155 Spring 2014 Unwanted Traffic: Denial of Service Attacks Dan Boneh 1 What is network DoS?! Goal: take out a large site with little computing work! How: Amplification n Small number of packets big

More information

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015 Lecture 10 Denial of Service Attacks (cont d) Thursday 24/12/2015 Agenda DoS Attacks (cont d) TCP DoS attacks DNS DoS attacks DoS via route hijacking DoS at higher layers Mobile Platform Security Models

More information

Internet Security: How the Internet works and some basic vulnerabilities. *Slides borrowed from Dan Boneh

Internet Security: How the Internet works and some basic vulnerabilities. *Slides borrowed from Dan Boneh Iteret Security: How the Iteret works ad some basic vulerabilities *Slides borrowed from Da Boeh Iteret Ifrastructure ISP Backboe ISP Local ad iterdomai routig TCP/IP for routig ad messagig BGP for routig

More information

Internet Security: How the Internet works and some basic vulnerabilities

Internet Security: How the Internet works and some basic vulnerabilities CS 155 Iteret Security: How the Iteret works ad some basic vulerabilities Da Boeh Iteret Ifrastructure ISP Backboe ISP Local ad iterdomai routig TCP/IP for routig ad messagig BGP for routig aoucemets Domai

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Chapter 7. Denial of Service Attacks

Chapter 7. Denial of Service Attacks Chapter 7 Denial of Service Attacks DoS attack: An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU),

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

network security s642 computer security adam everspaugh

network security s642 computer security adam everspaugh network security s642 adam everspaugh ace@cs.wisc.edu computer security today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention 802.11 (wifi) STA = station AP = access point BSS = basic

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

CS644 Advanced Networks

CS644 Advanced Networks Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot

More information

Motivation for this class

Motivation for this class CSE 535 : Lecture 1 Itroductio to Acceleratio of Networkig Algorithms i Hardware Washigto Uiversity Fall 2003 http://www.arl.wustl.edu/arl/projects/fpx/cse535/ Copyright 2003, Joh W Lockwood Lockwood@arl.wustl.edu

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a

More information

IS-IS for IPv6. ISP Workshops

IS-IS for IPv6. ISP Workshops IS-IS for IPv6 ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April 2018

More information

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100 You should worry if you are below this point Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /0 * 100 o Optimistic: (Your

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Resource Public Key Infrastructure for Secure Border Gateway Protocol Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory

More information

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

TCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1

TCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1 TCP Iterals Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 TCP Usage Model Coectio setup 3-way hadshake Data trasport Seder writes data TCP Breaks data ito segmets Seds each segmet over IP Retrasmits,

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Unit 2. Basic Linux Security

Unit 2. Basic Linux Security it 2 Basic Liux ecurity oa Warre Cofigurig g Cliet ervices Cofigure superservers to hadle multiple etwork services et up admiistrative services like loggig ad pritig se simple etwork iformatio services

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Network Time Protocol (NTP)

Network Time Protocol (NTP) Network Time Protocol (NTP) Quick ad Dirty for AfNOG 2018 (Michuki Mwagi) Origial slides by Ayitey Bulley About NTP Network Time Protocol project http://tp.org NTP is a protocol desiged to sychroize the

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation Iformatio Metrics for Low-rate DDoS Attack Detectio : A Comparative Evaluatio Moowar. Bhuya Dept. of Computer Sciece ad Egg Kaziraga Uiversity Koraikhowa, Jorhat 785006, Assam moowar.tezu@gmail.com D.

More information

Implementing Consistency -- Paxos. Some slides from Michael Freedman

Implementing Consistency -- Paxos. Some slides from Michael Freedman Implemetig Cosistecy -- Paxos Some slides from Michael Freedma What do cliets see? Distributed stores use replicatio Fault tolerace ad scalability Does replicatio ecessitate icosistecy? Harder to program,

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (7 th Week) 7. Denial-of-Service Attacks 7.Outline Denial of Service Attacks Flooding Attacks Distributed Denial of Service Attacks Application Based

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks Security+ Guide to Network Security Fundamentals, Fourth Edition Network Attacks Denial of service Attacks Introduction: What is DoS? DoS attack is an attempt (malicious or selfish) by an attacker to cause

More information

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 8 Denial of Service First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Denial of Service denial of service (DoS) an action

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015 Lecture 6 Internet Security: How the Internet works and some basic vulnerabilities Thursday 19/11/2015 Agenda Internet Infrastructure: Review Basic Security Problems Security Issues in Routing Internet

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Network Time Protocol (NTP)

Network Time Protocol (NTP) Network Time Protocol (NTP) Quick ad Dirty for AfNOG 2017 (Ayitey Bulley) About NTP Network Time Protocol project http://tp.org NTP is a protocol desiged to sychroize the clocks of computers over a etwork.

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

Deploying 32-bit ASNs

Deploying 32-bit ASNs Deployig 32-bit ASNs ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 26 th September

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Foundations of Network and Computer Security

Foundations of Network and Computer Security Foundations of Network and Computer Security John Black Lecture #17 Oct 27 th 2005 CSCI 6268/TLEN 5831, Fall 2005 Backscatter Technique CAIDA (San Diego) owns large block of IP address space They have

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE NVP-903 Series Multi-Stream Network Video Ecoder REFERENCE GUIDE NVP-903 Series User Maual Table of Cotets 1 Itroductio... 4 1.1 Product Overview... 4 1.2 Product Features... 4 2 Pael Desig... 5 2.1 Frot

More information

Module Instantiation. Finite State Machines. Two Types of FSMs. Finite State Machines. Given submodule mux32two: Instantiation of mux32two

Module Instantiation. Finite State Machines. Two Types of FSMs. Finite State Machines. Given submodule mux32two: Instantiation of mux32two Give submodule mux32two: 2-to- MUX module mux32two (iput [3:] i,i, iput sel, output [3:] out); Module Istatiatio Fiite Machies esig methodology for sequetial logic -- idetify distict s -- create trasitio

More information

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately. Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

DDoS Testing with XM-2G. Step by Step Guide

DDoS Testing with XM-2G. Step by Step Guide DDoS Testing with XM-G Step by Step Guide DDoS DEFINED Distributed Denial of Service (DDoS) Multiple compromised systems usually infected with a Trojan are used to target a single system causing a Denial

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002 ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Bluetooth Basics. Bluetooth Overview

Bluetooth Basics. Bluetooth Overview Bluetooth Basics Bluetooth Overview Wireless techology for short-rage voice ad data commuicatio Low-cost ad low-power Provides a commuicatio platform betwee a wide rage of smart devices Not limited to

More information

Denial of Service. EJ Jung 11/08/10

Denial of Service. EJ Jung 11/08/10 Denial of Service EJ Jung 11/08/10 Pop Quiz 3 Write one thing you learned from today s reading Write one thing you liked about today s reading Write one thing you disliked about today s reading Announcements

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security Routing Security DDoS and Route Hijacks Merike Kaeo CEO, Double Shot Security merike@doubleshotsecurity.com DISCUSSION POINTS Understanding The Growing Complexity DDoS Attack Trends Packet Filters and

More information