Outline
•
Background and Terminology
•
Fundamental limits for optimal reactive defense
•
More realistic scenarios on Internet topology
•
Conclusions