Defenses: First Cut
On hosts, limit resources consumed per user.
For network protocols, let the network protocol hold the state.
What of other attacks?
Previous slide
Next slide
Back to first slide
View graphic version