Research Article
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features
Figure 3
A visualization of the features of different types of attack traffic. (a) Infltering. (b) HTTP. (c) Distributed denial. (d) Bruteforce SSH.
(a) |
(b) |
(c) |
(d) |