Research Article

A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters

Figure 11

Variation of memory storage between our scheme and the traditional scheme as the length of the attack path increases.