%PDF-1.4 9 0 obj << /S /GoTo /D (Outline1) >> endobj 12 0 obj (Introduction) endobj 13 0 obj << /S /GoTo /D (Outline2) >> endobj 16 0 obj (Background) endobj 17 0 obj << /S /GoTo /D (Outline3) >> endobj 20 0 obj (Example Attack) endobj 21 0 obj << /S /GoTo /D (Outline3.1.12) >> endobj 24 0 obj (Introduction to the Attack) endobj 25 0 obj << /S /GoTo /D (Outline3.2.14) >> endobj 28 0 obj (Basic Probe Response Algorithm) endobj 29 0 obj << /S /GoTo /D (Outline4) >> endobj 32 0 obj (Attack Simulation) endobj 33 0 obj << /S /GoTo /D (Outline4.1.18) >> endobj 36 0 obj (Internet Storm Center Distribution) endobj 37 0 obj << /S /GoTo /D (Outline4.2.21) >> endobj 40 0 obj (Other Internet Sensor Network Distributions) endobj 41 0 obj << /S /GoTo /D (Outline5) >> endobj 44 0 obj (Generalizing the Attack) endobj 45 0 obj << /S /GoTo /D (Outline5.1.26) >> endobj 48 0 obj (Covert Channels) endobj 49 0 obj << /S /GoTo /D (Outline5.2.29) >> endobj 52 0 obj (Other Networks) endobj 53 0 obj << /S /GoTo /D (Outline6) >> endobj 56 0 obj (Countermeasures) endobj 57 0 obj << /S /GoTo /D (Outline7) >> endobj 60 0 obj (Conclusion) endobj 61 0 obj << /S /GoTo /D [62 0 R /Fit ] >> endobj 64 0 obj << /Length 911 /Filter /FlateDecode >> stream xVn@+(ttI ZEA$"Ӡ_rFXhC=CrH>>9aD8*!BI*&넑3Kx-"yL+{{蘑X߇H#UaeAN! 벾cs:uYy@ KgQ*\ 0 %5Lu'q_qQ.F:m H>4G#s+lz=F5PgB(2"=]H&x3_ #w6x\wyH]0 h"㓣`Xʳ,ZU"yeEY3eng,̥_Pp?$(0ZyYeddzYex ƹ4C*.bP|YuJSE"r}&6ʶ5]aKZ tٜ˵{Ow|p^Q,S/B!H?5 ed4FEVނ#A 7Y^XD#]`;XU8,=?ndB1J!H6