Fig. 3From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysisVariance and Shannon entropy of TCP traffic in different network scenariosBack to article page