<br>On Thu, Jan 10, 2013 at 2:24 PM, Vernon Schryver <span dir="ltr"><<a href="mailto:vjs@rhyolite.com" target="_blank">vjs@rhyolite.com</a>></span> wrote:<br><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">
> thumb for reasonable response rate given query rates, but it seems like 50%<br>
> is in fact a good starting place.<br></div></blockquote><div> </div><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div class="im"></div>With slip=2 and the victim trying and retrying a total 3 times, the<br>
probability that all of the victims responses will be dropped is<br>
0.5*0.5*0.5 = 0.125. That makes the probability that the victim<br>
will get a response despite matching the DoS flood about 88%. That's<br>
not perfect, but not bad.</blockquote><div><br>Thanks for correcting my math. I was thinking that the probability that the victim got a response was dependent on query rate, but of course that would only be the case if response rate was a function of responses per time interval, not responses per number of queries. It's simply a function of response rate and retry, i.e., p = 1 - (1 - (1/slip))^retries -- a much better success rate than the alternative in the midst of a flood of forged queries.<br>
<br>Casey<br></div></div>