Real-time distributed malicious traffic monitoring for honeypots and network telescopes.
Samuel Oswald HunterBarry IrwinEtienne StalmansPublished in: ISSA (2013)
Keyphrases
- real time
- malicious traffic
- peer to peer
- network traffic
- computer networks
- detection mechanism
- wireless sensor networks
- traffic patterns
- worm detection
- traffic analysis
- distributed systems
- multi source
- network management
- forensic analysis
- peer to peer networks
- false alarms
- quality of service
- anomaly detection
- unsupervised learning