Fig. 14From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysisUTR frequency distribution in training dataBack to article page