PPT Slide
- Choice of monitored parameters:
- reliability vs performance
- separating legitimate from attack flows
- Creation and update of models
- Cooperation with other Source Routers
- Cooperation with the victim
Problem Statement? Related Work ? Desirable Characteristics ? D-WARD ? Thesis Goals ? Conclusion