Report copyright - Traffic Anomaly Detection Based on the IP Size Distribution · (a) botnet-based attack (b) proxy-based attack Fig. 4. Types of attacks and their effect on the IP size distribution:
Please pass captcha verification before submit form