Fig. 19From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysisNetwork traffic in WIDE datasetBack to article page