Fig. 3: In the figure above, we show the simulation of the RNNTM under a Botnet attack that attacks five nodes in close succession, starting at epoch 391 until epoch 403. | npj Wireless Technology

Fig. 3: In the figure above, we show the simulation of the RNNTM under a Botnet attack that attacks five nodes in close succession, starting at epoch 391 until epoch 403.

From: A trust model for networked systems

Fig. 3: In the figure above, we show the simulation of the RNNTM under a Botnet attack that attacks five nodes in close succession, starting at epoch 391 until epoch 403.

The three snapshots of the RNNTM-TG show the effects of the Botnet attack, with the first snapshot illustrating the network trust level at time 400 time units, just after the attack begins, followed by the 600-th, then followed by the snapshots at epoch 1400. We notice that the Botnet attack is still persisting at the last snapshot.

Back to article page