PPT Slide
Some other properties of DCAs
- Indirect link between attacker and target
- Tracking requires intersite coordination
- High attack rate - low contribution/site
- Each intermediary may have only 1 instance
- Intermediaries are often unaware
- Tacking exponential w/hops
- till Internet space is exhausted
- Most DCAs have been open loop
- closed loop feasible with Java, etc.
- closing the loop may lead back to attacker