Outline
Background and Terminology
Fundamental limits for optimal reactive defense
More realistic scenarios on Internet topology
Conclusions