Research Article
Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks
Table 2
The detection results of the Experiment I.
| Number | Meet C1:
| Meet C2:
| Judgment (the LDoS attacks exist) |
| Group 1 | None | None | None | Group 2 | TW6, TW11 | None | None | Group3 | T TW11 | T TW11 | T TW11 | Group 4 | T TW11 | T TW11 | T TW11 | Group 5 | T TW11 | T TW11 | T TW11 | Group 6 | T TW11 | T TW11 | T TW11 | Group 7 | T TW11 | T TW11 | T TW11 | Group 8 | T TW11 | T TW11 | T TW11 | Group 9 | T TW11 | T TW11 | T TW11 | Group 10 | T TW11 | T TW11 | TTW11 |
|
|