Figure 2: Data volumes of typical DDoS attacks against network resources (red) and server applications (blue).