Research Article

A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters

Figure 3

Utilization of BF and BFT to recover the information.