Network-Based Denial of Service Attacks
Trends
Profiles of Participants
Goals of Attacks
“Smurf” and “Fraggle”
“Smurf” (cont’d)
Prevention Techniques
Prevention Techniques (cont’d)
References
Author