FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping.
Hao FuZizhan ZhengAveek K. DasParth H. PathakPengfei HuPrasant MohapatraPublished in: SECON (2016)
Keyphrases
- network traffic
- detecting anomalous
- user intention
- intrusion detection
- anomaly detection
- user behavior
- network security
- feedback information
- intrusion detection system
- detect anomalies
- network intrusion detection
- network bandwidth
- network traffic data
- traffic data
- search result
- internet traffic
- social media
- user experience
- traffic patterns
- long range dependence
- information systems
- normal traffic
- active learning