VNF Router Performance with DDoS Functionality: Difference between revisions
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
Intel | Intel | ||
Spirent | |||
== Main Contact == | == Main Contact == | ||
Line 20: | Line 22: | ||
== PoC Proposal == | == PoC Proposal == | ||
[http://docbox.etsi.org/ISG/NFV/PER/05-CONTRIBUTIONS/2014/NFVPER(14) | [http://docbox.etsi.org/ISG/NFV/PER/05-CONTRIBUTIONS/2014//NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.docx NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.docx] | ||
[[media:NFVPER(14) | [[media:NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.pdf|Download PDF version]] |
Revision as of 14:46, 3 March 2014
PoC Team
AT&T
Telefonica
Brocade
Intel
Spirent
Main Contact
Ram (Ramki) Krishnan, Brocade ramk@brocade.com
PoC Demo
Brocade Communications Systems, Inc. San Jose, California, USA
Intel’s Comms. Infrastructure Solutions lab in Hillsboro, Oregon, USA
Abstract
This PoC aims to demonstrate various Layer 2-4 DDoS attacks, e.g. NTP reflection attack, being handled in real-time using a VNF router. This PoC also characterizes the performance impact of implementing Layer 2-4 DDoS attack detection/mitigation schemes in a VNF router.
PoC Proposal
NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.docx