Fig. 4From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsDDoS detection based on networkBack to article page