Thwarting zero-day polymorphic worms with network-level length-based signature generation.
Lanjia WangZhichun LiYan ChenZhi FuXing LiPublished in: IEEE/ACM Trans. Netw. (2010)
Keyphrases
- network traffic
- communication networks
- application level
- peer to peer
- complex networks
- computer networks
- network model
- levels of abstraction
- network design
- real time
- case study
- higher level
- network structure
- ip addresses
- traffic analysis
- network size
- path length
- data flow
- response time
- wireless sensor networks
- data mining