On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic.
Fatemeh Faraji DaneshgarMaghsoud AbbaspourPublished in: Int. J. Commun. Syst. (2019)
Keyphrases
- peer to peer
- network traffic
- internet traffic
- fault tolerance
- file sharing
- peer to peer networks
- ad hoc networks
- resource sharing
- load balancing
- digital libraries
- data sets
- intrusion detection system
- missing data
- data sharing
- fully distributed
- peer to peer systems
- web caching
- resource discovery
- overlay network
- knowledge base
- information retrieval