Research Article

The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

Figure 4

Volume of traffic on the attacked node in case of DDoS attack relative to simulation time.
172583.fig.004