Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis.
Saleh I. AlmotairiAndrew J. ClarkGeorge M. MohayJacob ZimmermannPublished in: NPC Workshops (2008)
Keyphrases
- principal component analysis
- ddos attacks
- dimensionality reduction
- independent component analysis
- principal components
- forensic analysis
- covariance matrix
- linear discriminant analysis
- malicious activities
- face recognition
- network traffic
- traffic flow
- discriminant analysis
- traffic volume
- traffic data
- real time
- daily life
- network resources
- singular value decomposition
- low dimensional
- traffic load
- signal processing
- neural network