Camouflage of Network Traffic to Resist Attack (CONTRA).
William WeinsteinJanet LepantoPublished in: DISCEX (2) (2003)
Keyphrases
- network traffic
- normal traffic
- network intrusions
- network intrusion
- malicious traffic
- intrusion detection
- network security
- anomaly detection
- computer networks
- network monitoring
- intrusion detection system
- traffic volume
- network intrusion detection
- traffic data
- network management
- network resources
- countermeasures
- dos attacks
- network traffic data
- internet traffic
- traffic analysis
- detection mechanism
- network attacks
- detecting anomalous
- maximum likelihood
- active learning
- network bandwidth
- peer to peer