A novel approach to detect extraneous network traffic from the compromised router.
Rajendra PatilChirag ModiPublished in: RAIT (2016)
Keyphrases
- network traffic
- detecting anomalous
- normal traffic
- anomaly detection
- intrusion detection
- detect anomalies
- computer networks
- intrusion detection system
- network intrusion detection
- network management
- network security
- traffic volume
- network monitoring
- traffic analysis
- internet traffic
- traffic data
- network traffic data
- ip address
- ip networks
- detection algorithm
- network resources
- network attacks
- traffic patterns
- network bandwidth
- routing algorithm
- databases
- maximum likelihood