Skip to main content

Table 4 Variation in entropy during normal web traffic. At different times, the source address and traffic entropy are provided for both existing and proposed approaches

From: Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds

Time (seconds)

Traffic

entropy

Source address entropy

Proposed traffic entropy

Proposed source

address entropy

0.6

2.9

2.9

2.8

2.8

3.6

4.8

6

3.2

5

6.6

5

6.9

4.1

5.4

9.6

5

7.5

4.1

6.2

12.6

5

7.9

4.1

6.6

15.6

5

8

4.1

7

18.6

5

8

4.1

7

21.6

5

8

4.1

7

24.6

5

8

4.1

7

27.6

5

8

4.1

7

30.6

5

8

4.1

7

33.6

5

8

4.1

7

36.6

5

8

4.1

7

39.6

5

8

4.1

7

42.6

5

8

4.1

7

45.6

5

8

4.1

7

48.6

5

8.3

4.1

7

51.6

5

8

4.1

7