Fig. 12From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsTimeline of an IP-spoofed DDoS attack in a malware-infected SystemBack to article page