Fig. 6From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysisDistribution of testing data in two-dimensional spaceBack to article page