Research Article

Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling

Figure 17

Analysis of behavior model of IP-spoofing DDoS attack.