The paper discusses flooding attacks on Internet Threat Monitors (ITM) and proposes a novel IP traceback method using honeypots to combat DDoS attacks. It highlights the challenges of distinguishing malicious traffic from legitimate traffic and presents an information-theoretic framework for modeling these attacks. The authors argue that successful defense against DDoS attacks requires tracking attack sources and addressing the exploitation of network vulnerabilities.