Fig. 7From: Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowdsEntropy during normal web traffic with Spoofed DDoS attacks the source address and traffic address entropy are observed and presentedBack to article page