Fig. 2From: A network-wide view-based detection and mitigation of a sophisticated Interest Flooding AttackThe topology used in the simulationBack to article page