Login / Signup
Towards Fingerprinting Malicious Traffic.
Amine Boukhtouta
Nour-Eddine Lakhdari
Serguei A. Mokhov
Mourad Debbabi
Published in:
ANT/SEIT (2013)
Keyphrases
</>
malicious traffic
network traffic
detection mechanism
traffic patterns
traffic analysis
intrusion detection
anomaly detection
ip addresses
normal traffic
traffic data
intrusion detection system
network security
traffic engineering
worm detection
computer networks