[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

flooding attacks and threats doc (was Re: Comments on draft-bagnulo-multi6dt-hba-00.txt



This flooding attack is slightly different from the one mentioned in the
threats document because there is no real victim invovled. Just the
routers and links which still needs to be prevented.



perhaps it would make sense to mention explicitly in the threats document that the target of a flooding attack may not be a host but an access link or an access router?


regards, marcelo



-mohan

--Jari



------------------------------------------
Please note that my former email address
mbagnulo@ing.uc3m.es is no longer in use
Please send mail to:
marcelo at it dot uc3m dot es
------------------------------------------