Research Article
A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters
Algorithm 1
Path information encoding
| (1) | procedureINFORMATION ENCODE | | (2) | Key = | | (3) | Value = | | (4) | For = 1 to do | | (5) | | | (6) | | | (7) | End for | | (8) | x = DynamicProbabilityMarking (switch) | | (9) | If is in x then | | (10) | For = 1 to do | | (11) | | | (12) | | | (13) | End for | | (14) | End if | | (15) | | | (16) | End procedure |
|