[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[SECURITY] Application layer attacks/DDoS attacks
- Subject: [SECURITY] Application layer attacks/DDoS attacks
- From: morrowc.lists at gmail.com (Christopher Morrow)
- Date: Sun, 24 May 2015 23:01:50 -0400
- In-reply-to: <CAJL_ZMMsQe7fKGULPfjJdsMkSJRWavPXf7w=t2OXQqh=7CsHtQ@mail.gmail.com>
- References: <CAOLsBOu_xVCOUYRPNwxZGCm0RMU93QetegDsp90jX67bsZMFyw@mail.gmail.com> <CAJL_ZMOSkmhX-a=EDtiCj24u_ZBoD_yH5TrWH0xs-umpkpE=UA@mail.gmail.com> <[email protected]> <CAOLsBOvyYZ8XQL7w9CFt=tBgKAPjegnFes6snETAa=NJipWTtA@mail.gmail.com> <CAOLsBOuJNpJm4Hc-tsjgaEAYG=ia-bYjV-e3S22fcD8-x8JWkw@mail.gmail.com> <CAJL_ZMMsQe7fKGULPfjJdsMkSJRWavPXf7w=t2OXQqh=7CsHtQ@mail.gmail.com>
On Sat, May 23, 2015 at 9:12 PM, jim deleskie <deleskie at gmail.com> wrote:
>> However, the trusted network initiative might be a good approach to start
>> influencing operators to apply anti-spoofing mechanisms.
>>
explain how you think the 'trusted network initiative' matters in the slightest?
-chris