From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems
Performance | Proposed algorithm | Intrusion detection system (IDS) |
---|---|---|
Detection of DDoS attack | Support | Support |
Detection of IP-spoofed DDoS attack | Support | Not supported |
Detection of system infected by malware | Support | Not supported |