Interesting data.
Do you filter or identify spoofed IP addresses?
Also, any data collected on more direct DoS attacks?
Thanks.
Rajesh.
--- begin message from Daniel Senie ---
We have had enough regular attacks on our web farm to put together tools
that catalogue the attacks, report
Most content providers don't want multicast because it breaks their
billing model. They can't tell how many viewers they have at a given
moment, what the average viewing time is, or any of the other things
that unicast allows them to determine and more importantly bill their
advertisers
Hi
Is there a way for an ISP to determine the ingress router interface at
its network border that will carry IP traffic _from_ an IP address not
owned by it?
I don't want to assume the path is the same in both directions, and tools
such as CAIDA's skitter plot paths from specific sources.
--- begin message from Dylan Greene ---
On Thu, Jun 20, 2002 at 05:42:23PM -0400, Rajesh Talpade wrote:
Is there a way for an ISP to determine the ingress router interface at
its network border that will carry IP traffic _from_ an IP address not
owned by it?
I don't want