Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
OrganisationUniversity of Amsterdam
DeliverableReport

 

Identifying the path followed by malicious traffic is needed to secure networks. The knowledge of the ingress and egress points, as well as the intermediate hops, allows in principle to counteract the attacks.

...