Fig. 6From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsProcess for detection of IP-spoofed DDoS malwareBack to article page