In figure 6, we plot 3 graphs of based on the first 600s
of the trace. We insert a fictitious attack of SYN flooding at
time 300s for a duration of 300s. The top graph represents the
size of the backlog with the standard connection establishment
time–out. In the middle graph as we merge a fictitious attack,
we observe that the backlog size is over S during the attack,
which could possibly lead to a server crash with this overflow
of memory. In the bottom, as we managed the backlog with our
technique, we notice that the SYN flooding attack is controlled
and a memory overflow is avoided.