Figure 8From: Sequence-order-independent network profiling for detecting application layer DDoS attacksPlots of additional attributes: the v 1 (a) and the v 2 (b) of normal traffic are shown in the first row; the v 1 (c) and the v 2 (d) of attacks are shown in the second row.Back to article page