Research Article
Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features
Figure 2
Comparison of WASPQ value and periodogram in normal and in attack flow.
| (a) WASPQ of normal flow |
| (b) WASPQ of attack flow |
| (c) Periodogram of normal flow |
| (d) Periodogram of attack flow |