Research Article

A Traffic Cluster Entropy Based Approach to Distinguish DDoS Attacks from Flash Event Using DETER Testbed

Figure 7

(a) Throughput of normal traffic. (b) Source address entropy of normal traffic. (c) Traffic cluster entropy of normal traffic.
259831.fig.007a
(a)
259831.fig.007b
(b)
259831.fig.007c
(c)