Identifying network traffic features suitable for honeynet data analysis.
Mohammed H. SqalliSyed Naeem FirdousKhaled SalahMarwan H. Abu-AmaraPublished in: CCECE (2011)
Keyphrases
- network traffic
- data analysis
- intrusion detection
- anomaly detection
- intrusion detection system
- network bandwidth
- internet traffic
- network security
- computer networks
- detecting anomalous
- network traffic data
- network intrusion detection
- network monitoring
- feature extraction
- data mining
- real world
- peer to peer
- network management
- association rules
- feature space
- traffic patterns