Choosing parameters for detecting DDoS attack | IEEE Conference Publication | IEEE Xplore