Fig. 5From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsIP address and port number of IP-Spoofed DDoS attacksBack to article page