Fig. 5From: A network-wide view-based detection and mitigation of a sophisticated Interest Flooding AttackCommunication overhead of the controllerBack to article page