Research Article
Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy
Table 3
DDoS attack time on November 3.
| Type ID | Attack type | Attack time |
| 1 | PortMap | 9 : 43–9 : 51 | 2 | NetBIOS | 10 : 00–10 : 09 | 3 | LDAP | 10 : 21–10 : 30 | 4 | MSSQL | 10 : 33–10 : 42 | 5 | UDP | 10 : 53–11 : 03 | 6 | UDPLag | 11 : 14–11 : 24 | 7 | SYN | 11 : 28–17 : 35 |
|
|