Research Article
Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy
Table 4
DDoS attack time on December 1.
| Type ID | Attack type | Attack time |
| 1 | NTP | 10 : 35–10 : 45 | 2 | DNS | 10 : 52–11 : 05 | 3 | LDAP | 11 : 22–11 : 32 | 4 | MSSQL | 11 : 36–11 : 45 | 5 | NetBIOS | 11 : 50–12 : 00 | 6 | SNMP | 12 : 12–12 : 23 | 7 | SSDP | 12 : 27–12 : 37 | 8 | UDP | 12 : 45–13 : 09 | 9 | UDPLag | 13 : 11–13 : 15 | 10 | TFTP | 13 : 35–17 : 15 |
|
|