Research Article
A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer
Figure 8
Comparative results of model detection under different data flow samples on the blockchain network layer. (a) Comparison of detection recall, (b) comparison of detection accuracy, (c) comparison of detection F1-score, and (d) comparison of detection time.
(a) |
(b) |
(c) |
(d) |