PPT Slide
- MULTOPS
+ Source routers can effectively constrain/trace the attack
+ Internet resources are preserved
- Attack detection is hard
- Many deployment points needed for high efficacy
Problem Statement? Related Work ? Desirable Characteristics ? D-WARD ? Thesis Goals ? Conclusion