VNF Router Performance with DDoS Functionality: Difference between revisions
Line 28: | Line 28: | ||
[[media:NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.pdf|Download PDF version]] | [[media:NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.pdf|Download PDF version]] | ||
== PoC Interim Report (29 April 2014) | == PoC Report == | ||
[http://docbox.etsi.org/ISG/NFV/PER/05-CONTRIBUTIONS/2014//NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx] | PoC Interim Report (29 April 2014): [http://docbox.etsi.org/ISG/NFV/PER/05-CONTRIBUTIONS/2014//NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx] |
Revision as of 07:56, 17 September 2014
PoC Team
AT&T
Telefonica
Brocade
Intel
Spirent
Main Contact
Ram (Ramki) Krishnan, Brocade ramk@brocade.com
PoC Demo
Brocade Communications Systems, Inc. San Jose, California, USA
Intel’s Comms. Infrastructure Solutions lab in Hillsboro, Oregon, USA
ETSI NFV PoC ZONE @ SDN & OpenFlow World Congress, 15-17 October 2014, Dusseldorf, Germany
Abstract
This PoC aims to demonstrate various Layer 2-4 DDoS attacks, e.g. NTP reflection attack, being handled in real-time using a VNF router. This PoC also characterizes the performance impact of implementing Layer 2-4 DDoS attack detection/mitigation schemes in a VNF router.
PoC Proposal
NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.docx
PoC Report
PoC Interim Report (29 April 2014): NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx