Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity.
R. WeaverPublished in: IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
- peer to peer
- network traffic
- user activity
- user preferences
- individual user
- wireless sensor networks
- end users
- collaborative filtering
- user defined
- user interaction
- user activities
- user satisfaction
- ddos attacks
- network administrators
- communication networks
- user feedback
- structured light
- network architecture
- communication patterns
- user profiles
- recommender systems
- user interface
- traffic patterns
- social activities
- normal behavior
- denial of service attacks
- network structure
- interactive visualization
- human behavior
- neural network
- user behavior
- intrusion detection
- web search
- relevance feedback
- artificial neural networks
- website
- image processing