Fig. 14From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsDiagram of experiment environmentBack to article page