Research Article

Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features

Figure 2

Comparison of WASPQ value and periodogram in normal and in attack flow.
(a) WASPQ of normal flow
(b) WASPQ of attack flow
(c) Periodogram of normal flow
(d) Periodogram of attack flow