Fig. 7From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsCollection and analysis of network packetsBack to article page