2009
DOI: 10.17487/rfc5635
|View full text |Cite
|
Sign up to set email alerts
|

Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)

Abstract: Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(36 citation statements)
references
References 2 publications
0
35
1
Order By: Relevance
“…17 Meanwhile, the Korean Communications Commission (KCC) provided a security consulting to 60 small ICT service companies in cooperation with the Korea Internet and Security Agency (KISA) on June to December 2012 and identified a total of 1157 vulnerabilities, including unnecessary exposure of information or administrator functions. [18][19][20][21][22][23][24] This meant that each company had an average of 19 security-related vulnerabilities and it was urgent to initiate some measures for information protection. Many problems associated with the security of personal information (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…17 Meanwhile, the Korean Communications Commission (KCC) provided a security consulting to 60 small ICT service companies in cooperation with the Korea Internet and Security Agency (KISA) on June to December 2012 and identified a total of 1157 vulnerabilities, including unnecessary exposure of information or administrator functions. [18][19][20][21][22][23][24] This meant that each company had an average of 19 security-related vulnerabilities and it was urgent to initiate some measures for information protection. Many problems associated with the security of personal information (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…The BLACKHOLE community MAY also be used as one of the trigger communities in a destination-based Remote Triggered Blackhole (RTBH) [RFC5635] configuration.…”
Section: Ip Prefix Announcements With Blackhole Community Attachedmentioning
confidence: 99%
“…In order to dampen the effects of these DDoS attacks, IP networks have offered blackholing with BGP [RFC4271] using various mechanisms such as those described in [RFC3882] and [RFC5635].…”
Section: Introductionmentioning
confidence: 99%
“…Black-holing mechanism [20], [21] describes an operational technique that utilizes a sinkhole tunnel. A sinkhole tunnel is implemented at all possible entry points from which attacks can pass into the destination / attacked autonomous system.…”
Section: Traceback Mechanism With Overlay Networkmentioning
confidence: 99%