Detecting P2P botnets by discovering flow dependency in C&C traffic.
Hongling JiangXiuli ShaoPublished in: Peer-to-Peer Netw. Appl. (2014)
Keyphrases
- network traffic
- internet traffic
- peer to peer
- ddos attacks
- traffic flow
- origin destination
- cellular automaton model
- flow patterns
- resource discovery
- peer to peer computing
- real time
- traffic data
- peer to peer systems
- traffic management
- distributed systems
- file sharing
- trust management
- overlay network
- data sharing
- traffic control
- road network
- differentiated services
- anomaly detection
- scalable distributed
- data mining