Organisation | University of Amsterdam |
---|---|
Deliverable | Report |
Identifying the path followed by malicious traffic is needed to secure networks. The knowledge of the ingress and egress points, as well as the intermediate hops, allows in principle to counteract the attacks.
...