Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic.
Long ChenQiaojuan WangYanqing SongJianguo ChenPublished in: COMPSAC (2023)
Keyphrases
- feature analysis
- malicious traffic
- network traffic
- detection mechanism
- intrusion detection
- network security
- anomaly detection
- computer networks
- traffic patterns
- network management
- intrusion detection system
- face recognition
- traffic data
- feature extraction
- traffic analysis
- peer to peer
- normal traffic
- information security
- access control
- ip addresses
- denial of service attacks
- linear discriminant analysis