Drop Tail
Network topology A. Shown are User 1, Attacker 1, Attacker 2, and the Total bandwidth. Once the attack is fully engaged, the legitimate user (blue curve) is left with little or no bandwidth.
Previous slide
Next slide
Back to first slide
View graphic version