Fig. 1From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsInstallation of XOR DDoS malwareBack to article page