Fig. 11From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsAnalysis of feature information using DMF tableBack to article page