You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
How PCA is implemented in the code? It seems that it is using some linear regression model (statsmodels.regression.linear_model.OLS) between 'source IP' and 'destination IP'.
I do not understand why Ydist coverge to the interval (-1,1) and how Ydist is related to PCA residuals.
Another question: in the original paper "A Novel DDoS Attack..." the autors describes a attack without a fixed target. But the implemented attack requires a IP target. How it works?
The text was updated successfully, but these errors were encountered:
Hello! Nice work!
How PCA is implemented in the code? It seems that it is using some linear regression model (statsmodels.regression.linear_model.OLS) between 'source IP' and 'destination IP'.
I do not understand why Ydist coverge to the interval (-1,1) and how Ydist is related to PCA residuals.
Another question: in the original paper "A Novel DDoS Attack..." the autors describes a attack without a fixed target. But the implemented attack requires a IP target. How it works?
The text was updated successfully, but these errors were encountered: