Both in research papers and in practical guides related to DDoS attack mitigation there often appear some, as we prefer to put it, questionable approaches to the said mitigation.
We honestly find somewhat disturbing that such approaches still exist and, apparently, are implemented across production systems.
The talk presents a short outline of those approaches, or at least those usually deployed by ISPs, in a presumably funny manner.