PPT Slide
- Attackers follow developments in security
- Attackers could attempt to avoid detection:
- pulsing attacks
- generating reverse packets
- gradually use up victim’s resources
- mistrain models
- Attackers could attempt to misuse the system:
- Attackers might DDoS Source Router
Problem Statement? Related Work ? Desirable Characteristics ? D-WARD ? Thesis Goals ? Conclusion