Distributed Denialof Service Attacks
What Are DDoS Tools?
How They Work
Agile Attackers
Source-Address Spoofing
How They Talk
Deploying DDOS
Detecting DDOS Tools
What are the Strong Defenses?
What Can ISPs Do?
Traffic Volume Monitoring
Can We Do Better Some Day?
ICMP Traceback
Enhanced Congestion Control
References
Email: smb@research.att.com
Home Page: http://www.research.att.com/~smb
Download presentation source