Figure 4From: Sequence-order-independent network profiling for detecting application layer DDoS attacksValues of the proposed attributes for normal and attack connections: the α i (a), the τ i (b) and the γ i (c) of normal are shown in the first row; the α i (d), the τ i (e), and the γ i (f) of attacks are shown in the second row.Back to article page