{"id":1944,"date":"2022-11-17T12:25:30","date_gmt":"2022-11-17T20:25:30","guid":{"rendered":"https:\/\/ant.isi.edu\/blog\/?p=1944"},"modified":"2023-01-06T13:11:43","modified_gmt":"2023-01-06T21:11:43","slug":"usc-viterbi-and-isi-news-about-anycast-agility-paper","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=1944","title":{"rendered":"USC\/Viterbi and ISI news about &#8220;Anycast Agility&#8221; paper"},"content":{"rendered":"\n<p><a href=\"https:\/\/viterbischool.usc.edu\/news\/2022\/11\/anycast-agility-a-playbook-for-combatting-online-attacks\/\">USC Viterbi<\/a> and <a href=\"https:\/\/www.isi.edu\/news\/52052\/anycast-agility-a-playbook-for-combatting-online-attacks\/\">ISI<\/a> both posted a news article about our paper \u201c<a rel=\"noreferrer noopener\" href=\"https:\/\/ant.isi.edu\/bib\/Rizvi22a.html\" target=\"_blank\">Anycast Agility: Network Playbooks to Fight DDoS<\/a>\u201d.<\/p>\n\n\n\n<p>Please see our <a href=\"https:\/\/ant.isi.edu\/blog\/?p=1829\">blog entry for the abstract<\/a> and the <a href=\"https:\/\/ant.isi.edu\/bib\/Rizvi22a.html\">full technical paper for the real details<\/a>, but <a href=\"https:\/\/viterbischool.usc.edu\/news\/2022\/11\/anycast-agility-a-playbook-for-combatting-online-attacks\/\">their<\/a> <a href=\"https:\/\/www.isi.edu\/news\/52052\/anycast-agility-a-playbook-for-combatting-online-attacks\/\">posts<\/a> are very accessible.  And with the hacker in the hoodie, you know it&#8217;s serious :-)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/USC-ISI-1200x600-16.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/USC-ISI-1200x600-16-1024x512.png\" alt=\"\" class=\"wp-image-1945\" srcset=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/USC-ISI-1200x600-16-1024x512.png 1024w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/USC-ISI-1200x600-16-300x150.png 300w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/USC-ISI-1200x600-16-768x384.png 768w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/USC-ISI-1200x600-16.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">The canonical hacker in the hoodie, testifying to serious security work.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>USC Viterbi and ISI both posted a news article about our paper \u201cAnycast Agility: Network Playbooks to Fight DDoS\u201d. Please see our blog entry for the abstract and the full technical paper for the real details, but their posts are very accessible. And with the hacker in the hoodie, you know it&#8217;s serious :-)<\/p>\n","protected":false},"author":2,"featured_media":1945,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[43,166,71,339,154,63,58,29,225,5,76,357,57,144],"class_list":["post-1944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-anycast","tag-bgp","tag-datasets","tag-ddidd","tag-ddos","tag-dns","tag-isi","tag-network-traffic","tag-paaddos","tag-papers","tag-press","tag-reblog","tag-usc","tag-utwente"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1944"}],"version-history":[{"count":2,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1944\/revisions"}],"predecessor-version":[{"id":1972,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1944\/revisions\/1972"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/media\/1945"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}