Detection of Encrypted Traffic in eDonkey Network through Application Signatures.
Mário M. FreireDavid A. CarvalhoManuela PereiraPublished in: AP2PS (2009)
Keyphrases
- network traffic
- network traffic monitoring
- traffic analysis
- anomaly detection
- resource utilization
- worm detection
- detection algorithm
- malicious traffic
- normal traffic
- network resources
- traffic data
- transportation networks
- internet traffic
- signature verification
- traffic volume
- detect anomalies
- atm networks
- real time
- network management
- false alarms
- complex networks
- detection method
- peer to peer
- object detection