Using Code Bloat to Obfuscate Evolved Network Traffic.
Patrick LaRocheA. Nur Zincir-HeywoodMalcolm I. HeywoodPublished in: EvoApplications (2) (2010)
Keyphrases
- network traffic
- malicious code
- intrusion detection
- anomaly detection
- network monitoring
- intrusion detection system
- computer networks
- network management
- network bandwidth
- network security
- traffic data
- internet traffic
- traffic analysis
- traffic volume
- detecting anomalous
- network traffic data
- source code
- training data
- traffic patterns
- static analysis