Sign in

Flow based containerized honeypot approach for network traffic analysis: An empirical study.

Sibi Chakkaravarthy SethuramanTharshith Goud JadapalliDevi Priya Vimala SudhakaranSaraju P. Mohanty
Published in: Comput. Sci. Rev. (2023)
Keyphrases
  • traffic analysis
  • network security
  • network traffic
  • internet traffic
  • traffic data
  • search algorithm
  • peer to peer
  • real world
  • anomaly detection
  • complex networks
  • computer networks