Research Article

Investigating Brute Force Attack Patterns in IoT Network

Figure 12

Snapshot of the node-to-node traffics during the attack.
(a)
(b)
(c)
(d)
(e)
(f)