Figure 5From: Virtual network security: threats, countermeasures, and challenges Example of path splitting used to mitigate an information interception attack. Back to article page