Research Article

Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks

Table 2

The detection results of the Experiment I.

NumberMeet C1: 
Meet C2: 
Judgment 
(the LDoS attacks exist)

Group 1NoneNoneNone
Group 2TW6, TW11NoneNone
Group3T TW11T TW11T TW11
Group 4T TW11T TW11T TW11
Group 5T TW11T TW11T TW11
Group 6T TW11T TW11T TW11
Group 7T TW11T TW11T TW11
Group 8T TW11T TW11T TW11
Group 9T TW11T TW11T TW11
Group 10T TW11T TW11T TW11