Research Article

A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer

Figure 11

Comparison of detection performances over redundancy P2P and rumour-based traffic with the P2P DDoS detection method: (a) performance comparison of redundant P2P traffic detection and (b) performance comparison of rumour-based traffic detection.
(a)
(b)