Article Figure 1 Figure 2 Figure 3 Figure 4 may2000.tar

Figure 4: DoS attack using echo ports as a source and destination between two routers on a slow WAN link (initial packets use spoofed IP address of one of the routers)