The document discusses a combined method for tracing and blocking DDoS attack sources, highlighting the use of packet marking by routers which stores hash values in packet headers. It describes the simulation of this method using a network emulation program to evaluate its effectiveness and parameters, alongside results demonstrating its performance under different network topologies. The findings suggest that while some configurations yield high false detection probabilities, others effectively minimize these risks, supporting the method's potential utility in combatting DDoS attacks.