Research Article
A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer
Figure 10
Comparison of detection performances over redundancy P2P and rumour-based traffic with related method: (a) performance comparison of redundant P2P traffic detection and (b) performance comparison of rumour-based traffic detection.
(a) |
(b) |