Research Article

Attacker Traceability on Ethereum through Graph Analysis

Figure 3

The internal transaction distribution of DDos attack.