Skip to main content

Table 6 Variation in entropy during normal web traffic with non-spoofed DDoS attacks. The dynamics of source address and traffic entropies are recorded against different times

From: Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds

Time (seconds) Traffic entropy Source address entropy Proposed traffic entropy Proposed source
address entropy
0.6 3 3 2 2
4.2 5.3 6 4.5 5
7.8 5.3 7 4.5 6
11.4 5.3 8 4.5 7
15 5.3 8.56 4.5 7.23
18.6 5.3 8.56 4.5 7.23
22.2 5.3 8.56 4.5 7.23
25.8 5.7 8.56 4.9 7.23
29.4 5.7 8.56 4.9 7.78
33 5.7 8.77 4.9 7.78
36.6 5.7 8.77 4.9 7.78
40.2 5.7 8.77 4.9 7.78
43.8 5.7 8.77 4.9 7.78
47.4 5.3 8.77 4.5 7.78
51 5.3 8.56 4.5 7.23
54.6 5.3 8.56 4.5 7.23
58.2 5.3 8.56 4.5 7.23
61.8 5.3 8.56 4.5 7.23