Botnet protocol inference in the presence of encrypted traffic.
Lorenzo De CarliRuben TorresGaspar Modelo-HowardAlok TongaonkarSomesh JhaPublished in: INFOCOM (2017)
Keyphrases
- denial of service attacks
- network traffic
- ddos attacks
- network devices
- medium access control
- network layer
- dos attacks
- bayesian networks
- application layer
- ip address
- probabilistic inference
- traffic data
- peer to peer
- traffic flow
- real time
- stepping stones
- ip addresses
- lightweight
- worm detection
- medium access
- probabilistic model
- cryptographic protocols
- tcp ip
- intrusion detection
- intrusion detection system
- belief networks
- traffic congestion
- inference process