Research Article

A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters

Algorithm 1

Path information encoding
(1)procedureINFORMATION ENCODE
(2)Key = 
(3)Value = 
(4)For  = 1 to do
(5)
(6)
(7)End for
(8)x = DynamicProbabilityMarking (switch)
(9)If   is in x then
(10)For = 1 to do
(11)
(12)
(13)End for
(14)End if
(15)
(16)End procedure