Signatures of Viber Security Traffic.
M. A. K. SudozaiNisar HabibShahzad SaleemA. A. KhanPublished in: J. Digit. Forensics Secur. Law (2017)
Keyphrases
- malicious traffic
- network traffic
- intrusion detection
- signature verification
- security requirements
- computer security
- denial of service attacks
- information security
- denial of service
- network management
- security issues
- network layer
- security level
- traffic flow
- access control
- malicious activities
- traffic patterns
- traffic engineering
- malware detection
- network monitoring
- dos attacks
- traffic management
- security mechanisms
- network security
- security threats
- real time
- internet traffic
- network resources
- statistical databases
- traffic load
- security policies
- internet service providers
- anomaly detection