Fig. 18From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsPacket information collected by DMFBack to article page