Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions.
Jianhua YangLixin WangSuhev ShakyaPublished in: J. Internet Serv. Inf. Secur. (2022)
Keyphrases
- moving objects
- network traffic
- normal traffic
- intrusion detection
- intrusion detection system
- anomaly detection
- traffic analysis
- detection algorithm
- detecting anomalous
- network security
- network attacks
- network bandwidth
- detect anomalies
- computer networks
- traffic volume
- network intrusions
- traffic data
- network intrusion detection
- network management
- traffic patterns
- network traffic data
- malicious traffic
- internet traffic
- network monitoring
- network resources
- stepping stones
- worm detection
- routing algorithm
- ip networks
- ip addresses