Skip to main content

Table 6 The performance comparison of the proposed algorithm and IDS

From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems

Performance

Proposed algorithm

Intrusion detection system (IDS)

Detection of DDoS attack

Support

Support

Detection of IP-spoofed DDoS attack

Support

Not supported

Detection of system infected by malware

Support

Not supported