Skip to main content

Table 4 Detection of IP-spoofed DDoS attack

From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems