Research Article
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
Table 6
The results of the agent run cycle during week 4.
| No. | Run phase | Cost | Input req. | Output |
| 1 | Identify normal/abnormal | 15,369 | 303,024 | Normal | Abnormal | IP | Req. | IP | Req. | 1,786 | 34,528 | 13,583 | 268,496 |
| 2 | Classify DDoS/FC | 13,583 | 268,496 | DDoS | FC | IP | Req. | IP | Req. | 10,838 | 264,551 | 2,745 | 3,945 |
| 3 | Control demons/zombies | 10,838 | 264,551 | Demons | Zombies | IP | Req. | IP | Req. | 7,186 | 175,624 | 3,670 | 88,927 |
|
|