How Asymmetric Is the Internet ?

A promising approach to mitigate large Distributed Denialof-Service (DDoS) attacks is to mitigate them closer to the source. To do this it is necessary to determine the network paths that the attackers use. A network path is a path that a packet takes to reach its target. However, determining the network path that an attacker used to reach its target is… CONTINUE READING