Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations.
Da-Yu KaoEn-Cih ChangFu-Ching TsaiPublished in: ICACT (2019)
Keyphrases
- network traffic
- ip addresses
- traffic analysis
- anomaly detection
- intrusion detection
- normal traffic
- network security
- computer networks
- traffic data
- network management
- internet traffic
- intrusion detection system
- network intrusion detection
- network bandwidth
- end hosts
- malicious traffic
- network resources
- traffic patterns
- databases
- ip address
- security policies
- routing algorithm
- real world