Detection of Sources Being Used in DDoS Attacks | IEEE Conference Publication | IEEE Xplore