FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping.
Hao FuZizhan ZhengAveek K. DasParth H. PathakPengfei HuPrasant MohapatraPublished in: CoRR (2016)
Keyphrases
- network traffic
- detecting anomalous
- user intention
- intrusion detection
- anomaly detection
- intrusion detection system
- user behavior
- traffic data
- network security
- feedback information
- network bandwidth
- internet traffic
- network traffic data
- social media
- search result
- network intrusion detection
- long range dependence
- query logs
- databases
- probabilistic model
- training set
- metadata
- feature selection