From: Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds
Time (seconds) | Traffic entropy | Source address entropy | Proposed traffic entropy | Proposed source address entropy |
---|---|---|---|---|
0 | 2.5 | 2.5 | 2.5 | 2.5 |
0.6 | 5.31 | 7 | 4.67 | 6 |
1.2 | 5.31 | 7.5 | 4.67 | 6.5 |
1.8 | 5.31 | 8 | 4.67 | 7.2 |
2.4 | 5.31 | 8 | 4.67 | 7.2 |
3.0 | 5.31 | 7.9 | 4.67 | 7.6 |
3.6 | 5.31 | 8 | 4.67 | 7.2 |
4.2 | 5.31 | 9.43 | 4.67 | 8.2 |
4.8 | 5.31 | 9.43 | 4.67 | 8.2 |
5.4 | 5.31 | 9.43 | 4.67 | 8.2 |
6.0 | 5.31 | 8 | 4.67 | 7.2 |
6.6 | 5.31 | 8 | 4.67 | 7.2 |
7.2 | 5.31 | 8 | 4.67 | 7.2 |
7.8 | 5.31 | 8 | 4.67 | 7.2 |
8.4 | 5.31 | 8 | 4.67 | 7.2 |
9.0 | 5.31 | 8 | 4.67 | 7.2 |
9.6 | 5.31 | 9.43 | 4.67 | 8.2 |
10.2 | 5.31 | 9.43 | 4.67 | 8.2 |