Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/8027
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bommisetti, S. | |
dc.contributor.author | Annappa, B. | |
dc.contributor.author | Tahiliani, M.P. | |
dc.date.accessioned | 2020-03-30T10:18:01Z | - |
dc.date.available | 2020-03-30T10:18:01Z | - |
dc.date.issued | 2014 | |
dc.identifier.citation | 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014, 2014, Vol., , pp.1105-1110 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8027 | - |
dc.description.abstract | Today, usage of internet is growing exponentially. Congestion detection and avoidance algorithms are the major issues in TCP/IP. Earlier, packet drops are only source of congestion indication, but it leads to loss of throughput. Active Queue Management (AQM) can detect congestion before the queue overflows and informs the end hosts to respond congestion. It allows gateways to drop packets when average queue is greater than maximum threshold and marks the packets otherwise. Explicit Congestion Notification (ECN) mechanism marks the packets when the average queue size is between predefined thresholds and improves the throughput of a network. But it depends on the end hosts to respond to congestion. So there is a possibility of misbehavior by sender to increase its congestion window, even if the receiver correctly signals about congestion. So misbehaving ECN sender flow obtains more throughput than the normal ECN-enabled flows. We present an Extended ECN mechanism that enables a router to mark packets and the receiver to signal congestion to the sender without trusting the sender whether it has responded congestion or not. Our improved mechanism is robust in detection and prevention of this misbehaving sender in network and compatible with ECN and TCP/IP mechanisms. � 2014 IEEE. | en_US |
dc.title | Extended ECN mechanism to mitigate ECN-based attacks | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.