Research Article

A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack

Figure 2

Defense process using the proxy creation.