next up previous contents
Next: Pulling the requirements together Up: Roadmap Previous: Inter company Brainstorm

Global Traffic Disasters

We can distinguish two (unfortunately common) further types of attack, being general denial of service by flooding (all too easy with multicast or reflectors) and traffic flow (source destination matrix) analysis. Defenses against these range from the introduction of inter-router authentication, to the generation of uniform random traffic noise that is reduced as real traffic is added. Charging for traffic also helps deter the former problem. A scenario that represents an extreme case of potential paranoia where we would be concerned with these attacks is that of an Mbone based Share Auction.



Jon CROWCROFT
1998-12-03