“…Among these works, some have been providing solutions that identify anomalies in the network in order to detect different types of DDoS attacks. 58,61,84,88,90,92,107,109,128,139,146,147,150,152,154,155 Such solutions often use statistical analysis, machine learning algorithms, or trust in external applications such as Bro Security Monitor. 98 In this context, Braga et al 49 provide a solution that uses Self-Organization Maps (SOM) to classify network traffic flows as normal and abnormal, based on flow statistics as parameters for the calculation of SOM.…”