Figure 3From: IP traceback through (authenticated) deterministic flow marking: an empirical evaluationA schematic illustration of DPM approach. Only the edge router takes part in traceback.Back to article page