
DDOS Attack in Depth
Like channeling a river down smaller separated channels, this approach distributes the impact of the distributed attack traffic to the point where it becomes manageable, thus dissipating any disturbance capability. The reliability of an Anycast network to mitigate a DDoS attack depends on the size of the attack and the size and efficiency of the network.
Corruption Law / Legal Linux Software Technology Telecom