Cover V09, I05
Article
Figure 1
Figure 2
Figure 3
Figure 4

may2000.tar


Figure 4: DoS attack using echo ports as a source and destination between two routers on a slow WAN link (initial packets use spoofed IP address of one of the routers)