From: Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds
Time (seconds) | Traffic entropy | Source address entropy | Proposed traffic entropy | Proposed source address entropy |
---|---|---|---|---|
0.6 | 2.9 | 2.9 | 2.8 | 2.8 |
3.6 | 4.8 | 6 | 3.2 | 5 |
6.6 | 5 | 6.9 | 4.1 | 5.4 |
9.6 | 5 | 7.5 | 4.1 | 6.2 |
12.6 | 5 | 7.9 | 4.1 | 6.6 |
15.6 | 5 | 8 | 4.1 | 7 |
18.6 | 5 | 8 | 4.1 | 7 |
21.6 | 5 | 8 | 4.1 | 7 |
24.6 | 5 | 8 | 4.1 | 7 |
27.6 | 5 | 8 | 4.1 | 7 |
30.6 | 5 | 8 | 4.1 | 7 |
33.6 | 5 | 8 | 4.1 | 7 |
36.6 | 5 | 8 | 4.1 | 7 |
39.6 | 5 | 8 | 4.1 | 7 |
42.6 | 5 | 8 | 4.1 | 7 |
45.6 | 5 | 8 | 4.1 | 7 |
48.6 | 5 | 8.3 | 4.1 | 7 |
51.6 | 5 | 8 | 4.1 | 7 |