MiddlePolice - Toward Enforcing Destination-Defined Policies in the Middle of the Internet
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Introduction
Distributed Denial of Service
Commercial Solutions
Advantages and Limitations
Network Capabilities
MiddlePolice
Architecture
Challenges
Capabilities
How to avoid underestimates
How to accept a packet
Bypass traffic throttle
Validate a source
Implementation
Evaluation
Path Length Inflation
Latency
Fair Share
Reactive Attacks
Premium Support
Conclusion
Taught by
ACM CCS