Research Article

An Adaptive Approach for Defending against DDoS Attacks

Figure 9

(a) The traffic chart of a noncommon user without adaptive control. (b) The traffic chart of a noncommon user under adaptive control.
570940.fig.009a
(a)
570940.fig.009b
(b)