Figure 2From: IP traceback through (authenticated) deterministic flow marking: an empirical evaluationThe marking process of PPM. The marking process in an attack path with three routers R 1, R 2, and R 3.Back to article page