Fig. 2: Simulation of the RNNTM when a DoS Attack (above), and a DDoS Attack (below) occurs against Server 2. | npj Wireless Technology

Fig. 2: Simulation of the RNNTM when a DoS Attack (above), and a DDoS Attack (below) occurs against Server 2.

From: A trust model for networked systems

Fig. 2: Simulation of the RNNTM when a DoS Attack (above), and a DDoS Attack (below) occurs against Server 2.

These attacks occur at different epochs within the CIC-IDS2017 Dataset, and affect the trust level of Server 2, and indirectly affect the trust level of the 13 devices and of Server 1.

Back to article page