Fig. 16From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsTest result (detection time of infected system by malware)Back to article page