Research Article
Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy
Table 1
Scenarios of Botnet traffic.
| ID | IRC | SPAM | CF | PS | DDoS | FF | P2P | US | HTTP |
| 1 | ✓ | ✓ | ✓ | — | — | — | — | — | — | 2 | ✓ | ✓ | ✓ | — | — | — | — | — | — | 3 | ✓ | — | — | ✓ | — | — | — | ✓ | — | 4 | ✓ | — | — | — | ✓ | — | — | ✓ | — | 5 | — | ✓ | — | ✓ | — | — | — | — | ✓ | 6 | — | — | — | ✓ | — | — | — | — | — | 7 | — | — | — | — | — | — | — | — | ✓ | 8 | — | — | — | ✓ | — | — | — | — | — | 9 | ✓ | ✓ | ✓ | ✓ | — | — | — | — | — | 10 | ✓ | — | — | — | ✓ | — | — | — | ✓ | 11 | ✓ | — | — | — | ✓ | — | — | — | ✓ | 12 | — | — | — | — | — | — | ✓ | — | — | 13 | — | ✓ | — | ✓ | — | — | — | — | ✓ |
|
|