Simulated network topologies
Each network topology A, B, and C consists of:
one legitimate user
one target host (the right most node in the networks)
a varied number of attack daemons.
A
B
C
Previous slide
Next slide
Back to first slide
View graphic version