PPT Slide
- Intrusion Detection Systems
- Router monitoring tools (CISCO)
+ Victim can successfully detect the attack
- Victim is helpless if:
attack consists of legitimate packets or
attack is of large volume
Problem Statement? Related Work ? Desirable Characteristics ? D-WARD ? Thesis Goals ? Conclusion