Fig. 8From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsProtocol stack for extraction of feature informationBack to article page