Fig. 4From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysisProcess diagram of the proposed detection methodBack to article page