Research Article
Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks
Table 1
Experiment I scheme.
| Number | Experiment group | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
| (s) | — | — | 1.0 | 1.0 | 1.0 | 1.0 | 2.0 | 2.0 | 2.0 | 2.0 | (s) | — | — | 0.1 | 0.1 | 0.3 | 0.3 | 0.1 | 0.1 | 0.3 | 0.3 | (M) | — | 20 | 20 | 30 | 20 | 30 | 20 | 30 | 20 | 30 |
|
|