Related Work - MULTOPS
Yes, it is similar to MULTOPS, but:
It is located on source side only
Traffic models do not rely only on packet ratio
Discovery of attacking machines
Can be pushed further in the network
Previous slide
Next slide
Back to first slide
View graphic version