Research Article

An Adaptive Approach for Defending against DDoS Attacks

Figure 8

(a) The traffic chart of a common user without adaptive control. (b) The traffic chart of a common user under adaptive control.
570940.fig.008a
(a)
570940.fig.008b
(b)