DDoS Attack Detection Method and Mitigation Using Pattern of the Flow
Outline
Introduction
DDoS Attack
Solution
Flow Entries Pattern Detection
Simulation
Normal Network
Unsecured Network
Secure Network
Result
Conclusion
Thank you
Recommended