Distinguishing Attacks from Legitimate Authentication Traffic at Scale.
Cormac HerleyStuart E. SchechterPublished in: NDSS (2019)
Keyphrases
- normal traffic
- phishing attacks
- network traffic
- security mechanisms
- semi fragile watermarking
- traffic analysis
- security risks
- dos attacks
- ddos attacks
- anomaly detection
- digital watermarking
- denial of service attacks
- real time
- detect malicious
- stepping stones
- intrusion detection system
- network security
- biometric authentication
- traffic patterns
- authentication protocol
- watermarking scheme
- image authentication
- traffic congestion
- denial of service
- malicious traffic
- scale space
- worm detection
- security protocols