Research Article

An Analysis of DDoS Attacks on the Instant Messengers

Figure 2

The server operations after the attack.