“…Among the works proposed to mitigate the Shrew attacks are using Active Queue Management (AQM) (Aleksandra and Knightly, 2003), taking drop history of each flow into account (Mahajan et al, 2001), randomizing the fixed minimum RTO in TCP parameter in to make the synchronized attack more difficult, router-based detection using auto-correlation, fair resource allocation, detection at edge routers, halting anomaly with weighted choking, frequency domain spectrum analysis, wavelet-based approach, Shrew attack protection techniques based on signal analysis (Yu, Kai and Yu-Kwong, 2005), (Xiapu and Chang, 2005) and simple priority-tagging filtering mechanism (Chang et al, 2009). …”