Analyzing network traffic to detect self-decrypting exploit code.
Qinghua ZhangDouglas S. ReevesPeng NingS. Purushothaman IyerPublished in: AsiaCCS (2007)
Keyphrases
- network traffic
- malicious code
- detecting anomalous
- normal traffic
- anomaly detection
- intrusion detection
- detect anomalies
- network security
- intrusion detection system
- network management
- network monitoring
- computer networks
- network resources
- traffic analysis
- network intrusion detection
- internet traffic
- traffic volume
- network attacks
- network bandwidth
- long range dependence
- source code
- network traffic data
- detection algorithm
- traffic data
- malicious traffic
- worm detection
- databases