VNF Router Performance with DDoS Functionality: Difference between revisions
No edit summary |
|||
Line 17: | Line 17: | ||
Intel’s Comms. Infrastructure Solutions lab in Hillsboro, Oregon, USA | Intel’s Comms. Infrastructure Solutions lab in Hillsboro, Oregon, USA | ||
'''[http://www.etsi.org/nfv-poc-zone ETSI NFV PoC ZONE @ SDN & OpenFlow World Congress], 15-17 October 2014, Dusseldorf, Germany''' | |||
==Abstract == | ==Abstract == |
Revision as of 07:56, 17 September 2014
PoC Team
AT&T
Telefonica
Brocade
Intel
Spirent
Main Contact
Ram (Ramki) Krishnan, Brocade ramk@brocade.com
PoC Demo
Brocade Communications Systems, Inc. San Jose, California, USA
Intel’s Comms. Infrastructure Solutions lab in Hillsboro, Oregon, USA
ETSI NFV PoC ZONE @ SDN & OpenFlow World Congress, 15-17 October 2014, Dusseldorf, Germany
Abstract
This PoC aims to demonstrate various Layer 2-4 DDoS attacks, e.g. NTP reflection attack, being handled in real-time using a VNF router. This PoC also characterizes the performance impact of implementing Layer 2-4 DDoS attack detection/mitigation schemes in a VNF router.
PoC Proposal
NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.docx
PoC Interim Report (29 April 2014)
NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx