Research Article

A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer

Figure 8

Comparative results of model detection under different data flow samples on the blockchain network layer. (a) Comparison of detection recall, (b) comparison of detection accuracy, (c) comparison of detection F1-score, and (d) comparison of detection time.
(a)
(b)
(c)
(d)