De-anonymous and Anonymous Technologies for Network Traffic Release.
Xiang TianYu WangYujia ZhuYong SunQingyun LiuPublished in: ATIS (2017)
Keyphrases
- network traffic
- intrusion detection
- anomaly detection
- network management
- network security
- intrusion detection system
- traffic analysis
- computer networks
- traffic volume
- data mining
- traffic data
- network intrusion detection
- network resources
- network bandwidth
- network monitoring
- traffic patterns
- network traffic data
- detecting anomalous
- peer to peer
- normal traffic
- traffic engineering
- databases