Figure 5From: Sequence-order-independent network profiling for detecting application layer DDoS attacksPlot of the h i for normal and attack connections after dimension reduction.Back to article page