Fig. 9From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected SystemsExtraction of feature informationBack to article page