Fig. 8From: Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowdsEntropy variation between traffic address entropy and source address entropy are presented during web traffic reflecting the non-spoofed DDoS attackBack to article page