Fig. 19From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsTime interval to detect the system infected by malwareBack to article page