Fig. 17From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsDetection of IP-spoofed DDoS attacks using DMF algorithmBack to article page