One-parameter Methods for Recognizing DDoS Attacks