@techreport{zinin-rtg-dos-02, number = {draft-zinin-rtg-dos-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-zinin-rtg-dos/02/}, author = {Alex D. Zinin}, title = {{Protecting Internet Routing Infrastructure from Outsider DoS Attacks}}, pagetotal = 17, year = 2005, month = may, day = 23, abstract = {The mechanism described in this document helps to secure an Internet Service Provider's router infrastructure from outsider attacks, including (but not limited to) Distributed denial of service (DDoS) attacks based on CPU and/or queue exhaustion (e.g., TCP SYN flooding and flooding of invalid MD5-signed routing protocol packets.) The presented approach is based on explicitly marking control packets from trusted sources by different link-layer encapsulation and does not require any modifications to user data exchange protocols, ICMP, routing protocols or changes to existing hardware in routers, which allows it to be deployed quickly throughout the Internet.}, }