Detecting and Mitigating P2P Eclipse Attacks.
Hatem IsmailDaniel GermanusNeeraj SuriPublished in: ICPADS (2015)
Keyphrases
- open source
- peer to peer
- detecting malicious
- source code
- network intrusion detection systems
- detect malicious
- overlay network
- malicious attacks
- data mining
- automatic detection
- countermeasures
- malicious users
- high level
- malicious activities
- peer to peer systems
- risk management
- development environments
- denial of service attacks
- traffic analysis
- file sharing
- misuse detection
- software projects
- intrusion detection
- peer to peer computing