Details, details Lots of additional details: Where to send filtering requests? How to prevent spoofed traffic shutting down legit traffic? How to preventing spoofed requests? How to avoid reflection attacks from legacy ISPs? Details here: http://www.cs.ucl.ac.uk/staff/F.Huici/publications/terminus-lsad.pdf Terminus: god of boundaries |