Research Article
A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters
Algorithm 1
Path information encoding
(1) | procedureINFORMATION ENCODE | (2) | Key = | (3) | Value = | (4) | For = 1 to do | (5) | | (6) | | (7) | End for | (8) | x = DynamicProbabilityMarking (switch) | (9) | If is in x then | (10) | For = 1 to do | (11) | | (12) | | (13) | End for | (14) | End if | (15) | | (16) | End procedure |
|