Research Article
Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features
Figure 2
Comparison of WASPQ value and periodogram in normal and in attack flow.
(a) WASPQ of normal flow |
(b) WASPQ of attack flow |
(c) Periodogram of normal flow |
(d) Periodogram of attack flow |