Fig. 3From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsMonitoring of network traffic by XOR DDoS attackBack to article page