Research Article

Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling

Figure 8

Analysis of DDoS characteristics.
(a) IP-spoofing DDoS traffic flowchart
(b) Network bandwidth usage