Fig. 2From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsDDoS attacks detected by intrusion detection systemBack to article page