Hi Someone can helping me with an use cases of article http://www.computer.org/csdl/mags/ic/2013/04/mic2013040084-abs.html
My doubt is the item that follows bellow • The customer might pass the traffic destined to the attacked server through a “scrubbing service,” either internal or external (as shown in the figure). This could require a complex set of changes to the DNS and routing systems. Regards, Fabio. [image: Inline image 1]
_______________________________________________ i2rs mailing list [email protected] https://www.ietf.org/mailman/listinfo/i2rs
