Research Article
Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features
Table 2
Detection rate and false-positive rate comparison of 3 algorithms in different network traffic.
| No. | Algorithm | | | | Network utilization (%) | Interference |
| 1 | CUSUM | 3 | 0 | 0 |
31.13 | Without | PSD | 0 | 0 | TF-HMM | 0 | 0 |
| 2 | CUSUM | 45 | 0 | 0 |
83.61 | With | PSD | 18 | 0 | TF-HMM | 0 | 0 |
| 3 | CUSUM | 23 | 1 | 2 |
33.15 | Without | PSD | 2 | 2 | TF-HMM | 2 | 2 |
| 4 | CUSUM | 45 | 19 | 30 |
47.23 | With | PSD | 40 | 25 | TF-HMM | 33 | 29 |
| 5 | CUSUM | 768 | 178 | 300 |
83.36 | With | PSD | 588 | 250 | TF-HMM | 323 | 279 |
|
|