1. Behal, S., Kumar, K.: Characterization and comparison of DDoS attack tools and traffic generators -a review. Int. J. Netw. Secur. 19(3), 383–393 (2017)
2. Cheng, J.R., Tang, X.Y., Yin, J.: A change-point DDoS attack detection method based on half interaction anomaly degree. Int. J. Auton. Adapt. Commun. Syst. 10(1), 38 (2017)
3. Advances in Intelligent Systems and Computing;VK Yadav,2016
4. Arbor Networks: Infrastructure Security Report (2012).
http://tinyurl.com/ag6tht4
. Accessed 22 May 2019
5. Ferreira, L.L.C., Assis, F.M., De Souza, C.P.: A comparative study of use of Shannon, Rényi and Tsallis entropy for attribute selecting in network intrusion detection. In: Proceedings of IEEE International Workshop on Measurements & Networking, vol. 7435, pp. 77–82 (2012)