Research Article
Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci
Figure 14
(a) End-to-end delay of each traffic without abnormal traffic. (b) End-to-end delay for each traffic with added bandwidth traffic. (c) End-to-end delay for each traffic with all abnormal traffic. (d) End-to-end delay of each traffic without abnormal traffic when ADS is applied. (e) End-to-end delay for each traffic with added bandwidth traffic when ADS is applied. (f) End-to-end delay for each traffic with all abnormal traffic when ADS is applied.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |