Hi

Someone can helping me with an use cases of article
http://www.computer.org/csdl/mags/ic/2013/04/mic2013040084-abs.html

My doubt is the item that follows bellow

• The customer might pass the traffic destined to the attacked server
through a “scrubbing service,” either internal or external (as shown in the
figure). This could require a complex set of changes to the DNS and routing
systems.

Regards,
Fabio.



[image: Inline image 1]
_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to