Login / Signup
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses.
Yin Minn Pa Pa
Katsunari Yoshioka
Tsutomu Matsumoto
Published in:
J. Inf. Process. (2015)
Keyphrases
</>
ip addresses
end hosts
detecting malicious
ip address
traffic analysis
detect malicious
network traffic
bloom filter
network security
ddos attacks
social networks
campus network
web pages
data processing