PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification.
Pratik NarangChittaranjan HotaV. N. VenkatakrishnanPublished in: EURASIP J. Inf. Secur. (2014)
Keyphrases
- peer to peer
- clustering algorithm
- clustering method
- k means
- real time
- origin destination
- resource discovery
- categorical data
- data clustering
- document clustering
- flow patterns
- overlay network
- traffic flow
- hierarchical clustering
- network traffic
- information theoretic
- distributed computing
- anomaly detection
- data points
- natural language
- malicious behavior
- malicious activities
- cluster analysis
- load balancing
- fuzzy clustering
- cellular automata
- high dimensional data
- multi party
- generation process
- digital libraries