Keyphrases
- network attacks
- peer to peer
- intrusion detection
- network security
- traffic analysis
- ddos attacks
- distributed network
- worm detection
- network intrusion
- network intrusion detection
- anomaly detection
- network traffic
- dos attacks
- intrusion detection system
- normal behavior
- network anomaly detection
- normal traffic
- intrusion prevention
- bandwidth usage
- computer networks
- internet traffic
- security threats
- denial of service attacks
- detection method
- network structure
- cyber attacks
- small world
- intrusion detection and prevention
- unstructured peer to peer
- query routing
- fully distributed
- ip address
- peer to peer systems
- file sharing
- peer to peer networks
- watermarking scheme
- false alarms