On the fractal characteristics of Internet network traffic and its utilization in covert communications.
Rashiq Rafiq MarieJonathan M. BlackledgeHelmut E. BezPublished in: ICITST (2009)
Keyphrases
- network traffic
- internet traffic
- computer networks
- network management
- anomaly detection
- malicious traffic
- intrusion detection
- traffic patterns
- traffic analysis
- network security
- network monitoring
- traffic data
- network resources
- communication networks
- intrusion detection system
- network intrusion detection
- network bandwidth
- traffic volume
- fractal dimension
- network traffic data
- databases
- long range dependence
- data mining
- tcp ip
- computer systems
- semi supervised
- ip addresses
- web caching
- detect anomalies
- knowledge discovery
- information systems
- machine learning