Difference between revisions of "VNF Router Performance with DDoS Functionality"

From NFVwiki
Jump to: navigation, search
Line 25: Line 25:
  
 
[[media:NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.pdf|Download PDF version]]
 
[[media:NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.pdf|Download PDF version]]
 +
 +
== PoC Interim Report (29 April 2014) ==
 +
[http://docbox.etsi.org/ISG/NFV/PER/05-CONTRIBUTIONS/2014//NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx]

Revision as of 21:52, 2 May 2014

PoC Team

AT&T

Telefonica

Brocade

Intel

Spirent

Main Contact

Ram (Ramki) Krishnan, Brocade ramk@brocade.com

PoC Demo

Brocade Communications Systems, Inc. San Jose, California, USA

Intel’s Comms. Infrastructure Solutions lab in Hillsboro, Oregon, USA

Abstract

This PoC aims to demonstrate various Layer 2-4 DDoS attacks, e.g. NTP reflection attack, being handled in real-time using a VNF router. This PoC also characterizes the performance impact of implementing Layer 2-4 DDoS attack detection/mitigation schemes in a VNF router.

PoC Proposal

NFVPER(14)000024a4__NFV_ISG_PoC_proposal__VNF_Router_Performance_with_DDoS_func.docx

Download PDF version

PoC Interim Report (29 April 2014)

NFVPER(14)000054_VNF_Router_Performance_with_DDoS_Functionality_-_report_to_S.docx