31-12-2010, 10:36 AM
hi..
thanks for the document of monitoring the application layer ddos attack for popular website, i need few more details abt the logical part i mean coding logic how they are going to design the access matrix? hope u will reply soon
thank you so much,
S.MD.IMTIAZ