Research Article

A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters

Figure 12

Comparison with the latest traceback scheme [16] in terms of controller CPU utilization.