Abstract
Effective prediction and detection of DDoS attacks directly depend on the quality of the information sources used as input for the prediction and detection mechanisms employed. Without a doubt, one of the best sources of information is the network traffic captured on the network interfaces of the protected devices. However, due to recent regulations such as the General Data Protection Reg…