Sign in

Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations.

Pieter BurghouwtMarcel E. M. SpruitHenk J. Sips
Published in: SecureComm (1) (2014)
Keyphrases
  • command and control
  • network traffic
  • situation awareness
  • ddos attacks
  • denial of service attacks
  • data mining
  • data analysis
  • anomaly detection
  • third party
  • security policies