From e84190111cf265d0e3cb6ab68c6caa99bf7f69b8 Mon Sep 17 00:00:00 2001 From: surtur Date: Thu, 20 May 2021 05:59:59 +0200 Subject: [PATCH] fix: correct the intro section cross-referencing --- tex/text.tex | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/tex/text.tex b/tex/text.tex index 01270c4..df4ddbc 100644 --- a/tex/text.tex +++ b/tex/text.tex @@ -40,14 +40,14 @@ Our thesis comprises two main parts - theoretical and practical. The theoretical part discusses relevant context, different types of attack methods and tools, mitigation attack methods and tools. The practical part describes a simulated simple topology and an attack in lab conditions. -In the first section of the theoretical part, we were focused on attack -definition. Section \ref{sec:attack-methods} attempts to categorise attack -methods based on several metrics and explain some of the mentioned. The third -section presents a list of some of the popular DoS tools that are available. -Next on, the \autoref{sec:mitigation-methods} traces various ways to mitigate -attacks, both on the user and provider level and the final section of the -theoretical part, \autoref{sec:mitigation-tools}, marks out some of the tools -that can be used to mitigate an attack. +In the first two sections of the theoretical part, we were focused on attack +definitions and providing context. Section \ref{sec:attack-methods} attempts to +categorise attack methods based on several metrics and explain some of the +mentioned. The fourth section presents a list of some of the popular DoS tools +that are available. Next on, the \autoref{sec:mitigation-methods} traces +various ways to mitigate attacks, both on the user and provider level and the +final section of the theoretical part, \autoref{sec:mitigation-tools}, marks +out some of the tools that can be used to mitigate an attack. First of the practical part, \autoref{sec:infrastructure-set-up-description} gives an overview of the tools used to construct the lab infrastructure and configure the systems, as well as specifics of the configuration. It also focuses on