Research Article

A Traffic Cluster Entropy Based Approach to Distinguish DDoS Attacks from Flash Event Using DETER Testbed

Figure 12

(a) Throughput of normal traffic with TCP attack. (b) Source address and traffic cluster entropy of normal traffic with TCP attack.
259831.fig.0012a
(a)
259831.fig.0012b
(b)