Malware Discovery Using Behaviour-Based Exploration of Network Traffic.
Jakub LokocTomás GrosupPremysl CechTomás PevnýTomás SkopalPublished in: SISAP (2017)
Keyphrases
- network traffic
- malicious code
- intrusion detection
- computer networks
- anomaly detection
- network security
- network monitoring
- traffic data
- intrusion detection system
- traffic analysis
- network bandwidth
- knowledge discovery
- network management
- traffic patterns
- network intrusion detection
- network resources
- reverse engineering
- data mining
- network traffic data
- long range dependence
- detecting anomalous
- traffic volume
- internet traffic
- association rules
- training data