Fig. 15From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsA comparative analysis of the proposed algorithm and IDSBack to article page