Detecting malicious network traffic using inverse distributions of packet contents.
Vijay KaramchetiDavi GeigerZvi M. KedemS. MuthukrishnanPublished in: MineNet (2005)
Keyphrases
- network traffic
- long range dependence
- detecting malicious
- end hosts
- internet traffic
- network security
- ip addresses
- intrusion detection
- anomaly detection
- normal traffic
- intrusion detection system
- fractional brownian motion
- traffic data
- computer networks
- traffic analysis
- routing algorithm
- network bandwidth
- network resources
- network intrusion detection
- network management
- metadata
- web pages
- response time