Fig. 10From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsFeature information of collected trafficBack to article page