Research Article
Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features
Table 2
Detection rate and false-positive rate comparison of 3 algorithms in different network traffic.
| | No. | Algorithm | | | | Network utilization (%) | Interference |
| | 1 | CUSUM | 3 | 0 | 0 |
31.13 | Without | | PSD | 0 | 0 | | TF-HMM | 0 | 0 |
| | 2 | CUSUM | 45 | 0 | 0 |
83.61 | With | | PSD | 18 | 0 | | TF-HMM | 0 | 0 |
| | 3 | CUSUM | 23 | 1 | 2 |
33.15 | Without | | PSD | 2 | 2 | | TF-HMM | 2 | 2 |
| | 4 | CUSUM | 45 | 19 | 30 |
47.23 | With | | PSD | 40 | 25 | | TF-HMM | 33 | 29 |
| | 5 | CUSUM | 768 | 178 | 300 |
83.36 | With | | PSD | 588 | 250 | | TF-HMM | 323 | 279 |
|
|