Detecting encrypted botnet traffic.
Han ZhangChristos PapadopoulosDaniel MasseyPublished in: INFOCOM Workshops (2013)
Keyphrases
- network traffic
- ddos attacks
- denial of service attacks
- peer to peer
- real time
- traffic data
- data sets
- traffic volume
- intrusion detection
- road network
- traffic patterns
- anomaly detection
- automatic detection
- encryption scheme
- third party
- traffic conditions
- traffic management
- traffic monitoring
- traffic information
- road traffic
- response time