Figure 1From: IP traceback through (authenticated) deterministic flow marking: an empirical evaluationA schematic illustration of PPM approach. All routers in the attack path take part in the traceback.Back to article page