Approach Overview
Attacking flows should stand out from legitimate flows by the number and frequency of packets in them.
Once attacking flows are identified measures can be taken to track and shut down the attacking machines.
Previous slide
Next slide
Back to first slide
View graphic version